Sciweavers

3356 search results - page 12 / 672
» Thresholds and Expectation Thresholds
Sort
View
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
14 years 1 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu
AIME
2005
Springer
14 years 2 months ago
Dichotomization of ICU Length of Stay Based on Model Calibration
This paper presents a method to choose the threshold for dichotomization of survival outcomes in a structured fashion based on data analysis. The method is illustrated with an appl...
Marion Verduijn, Niels Peek, Frans Voorbraak, Ever...
FCT
2009
Springer
14 years 3 months ago
Energy Complexity and Depth of Threshold Circuits
Abstract. In the paper we show that there is a close relationship between the energy complexity and the depth of threshold circuits computing any Boolean function although they hav...
Kei Uchizawa, Takao Nishizeki, Eiji Takimoto
EUROCRYPT
1998
Springer
14 years 25 days ago
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
Victor Shoup, Rosario Gennaro
ACNS
2004
Springer
120views Cryptology» more  ACNS 2004»
14 years 10 days ago
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions
A general technique of batch verification for equality of discrete logarithms is proposed. Examples of batching threshold decryption schemes are presented based on threshold versio...
Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byou...