Practical (fully) distributed signatures provably secure in the standard model
From MaRDI portal
Publication:2354772
DOI10.1016/j.tcs.2015.06.029zbMath1339.94082MaRDI QIDQ2354772
Duncan S. Wong, Qianhong Wu, Bo Qin, Yong Ding, Jian-wei Liu, Yujue Wang, Sherman S. M. Chow
Publication date: 24 July 2015
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2015.06.029
standard model; secret sharing; verifiable secret sharing; threshold signature; multipartite access structure; monotone span program; distributed signature
94A62: Authentication, digital signatures and secret sharing
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Ideal multipartite secret sharing schemes
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts
- Certificateless threshold signature secure in the standard model
- Certificateless threshold signature scheme from bilinear maps
- Certificateless threshold ring signature
- Hierarchical threshold secret sharing
- Secure distributed key generation for discrete-log based cryptosystems
- Pairings for cryptographers
- Multipartite secret sharing by bivariate interpolation
- Monotone circuits for monotone weighted threshold functions
- Efficient signature generation by smart cards
- Security arguments for digital signatures and blind signatures
- Weighted threshold secret sharing schemes
- On 2-level secret sharing
- Robust threshold DSS signatures
- Robust and efficient sharing of RSA functions.
- Short Attribute-Based Signatures for Threshold Predicates
- Secret-Sharing Schemes: A Survey
- How to share a secret
- Attribute-Based Signatures
- Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model
- Short and Stateless Signatures from the RSA Assumption
- Distributed RSA Signature Schemes for General Access Structures
- Practical Threshold Signatures Without Random Oracles
- Characterizing Ideal Weighted Threshold Secret Sharing
- Decentralized Attribute-Based Signatures
- Ideal Hierarchical Secret Sharing Schemes
- Efficient Identity-Based Encryption Without Random Oracles
- Policy-Based Signatures
- Practical Distributed Signatures in the Standard Model
- Mesh Signatures
- Threshold RSA for Dynamic and Ad-Hoc Groups
- Public Key Cryptography - PKC 2005
- Progress in Cryptology - INDOCRYPT 2004
- Natural Generalizations of Threshold Secret Sharing
- Public Key Cryptography - PKC 2006
- Computer Aided Verification