Sciweavers

2059 search results - page 6 / 412
» A Directed Threshold - Signature Scheme
Sort
View
EUC
2008
Springer
14 years 11 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
TWC
2008
132views more  TWC 2008»
14 years 9 months ago
Asymptotic BER analysis of threshold digital relaying schemes in cooperative wireless systems
Threshold relaying is an effective technique to achieve cooperative diversity in uncoded cooperative wireless networks, which suffer from error propagation due to detection errors...
Furuzan Atay Onat, Yijia Fan, Halim Yanikomeroglu,...
CRYPTO
1992
Springer
168views Cryptology» more  CRYPTO 1992»
15 years 1 months ago
Threshold Schemes with Disenrollment
Blakley, Blakley, Chan and Massey conjectured a lower bound on the entropy of broadcast messages in threshold schemes with disenrollment. In an effort to examine the conjecture, w...
Bob Blakley, G. R. Blakley, Agnes Hui Chan, James ...
SIPS
2006
IEEE
15 years 3 months ago
A New Early Termination Scheme of Iterative Turbo Decoding Using Decoding Threshold
Although many stopping methods of iterative decoding have been discussed in the literatures extensively, many of them only focus on the solvable decoding. In this paper, we propos...
Fan-Min Li, Cheng-Hung Lin, An-Yeu Wu
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
15 years 1 months ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang