Sciweavers

2059 search results - page 3 / 412
» A Directed Threshold - Signature Scheme
Sort
View
ACNS
2004
Springer
120views Cryptology» more  ACNS 2004»
13 years 9 months ago
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions
A general technique of batch verification for equality of discrete logarithms is proposed. Examples of batching threshold decryption schemes are presented based on threshold versio...
Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byou...
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 2 months ago
Almost Optimal Bounds for Direct Product Threshold Theorem
Abstract. We consider weakly-verifiable puzzles which are challengeresponse puzzles such that the responder may not be able to verify for itself whether it answered the challenge ...
Charanjit S. Jutla
ICCAD
2004
IEEE
107views Hardware» more  ICCAD 2004»
14 years 2 months ago
Computation of signal threshold crossing times directly from higher order moments
—This paper introduces a simple method for calculating the times at which any signal crosses a prespecified threshold voltage (e.g., 10%, 20%, 50%, etc.) directly from the moment...
Yehea I. Ismail, Chirayu S. Amin
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
13 years 11 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng