Sciweavers

525 search results - page 8 / 105
» Threshold Schemes with Disenrollment
Sort
View
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
IJNSEC
2011
77views more  IJNSEC 2011»
13 years 5 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
PCM
2004
Springer
106views Multimedia» more  PCM 2004»
14 years 3 months ago
Performance Improvement of Vector Quantization by Using Threshold
Abstract. Vector quantization (VQ) is an elementary technique for image compression. However, the complexity of searching the nearest codeword in a codebook is time-consuming. In t...
Hung-Yi Chang, Pi-Chung Wang, Rong-Chang Chen, Shu...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 8 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
ICDAR
1999
IEEE
14 years 2 months ago
Binarization of Document Images using Hadamard Multiresolution Analysis
In this article, we propose a new method that combines the use of a global threshold and a window-based scheme for computing local thresholds. The latter scheme compares the contr...
Fu Chang, Kung-Hao Liang, Tzu-Ming Tan, Wen-Liang ...