Practical Threshold Signatures with Linear Secret Sharing Schemes
From MaRDI portal
Publication:3637139
DOI10.1007/978-3-642-02384-2_11zbMath1246.94044OpenAlexW1843827732MaRDI QIDQ3637139
Ali Aydın Selçuk, ịlker N. Bozkurt, Kamer Kaya
Publication date: 7 July 2009
Published in: Progress in Cryptology – AFRICACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/11693/28698
Related Items (1)
Cites Work
- Threshold cryptography based on Asmuth-Bloom secret sharing
- A novel efficient \((t,n)\) threshold proxy signature scheme
- How to share a function securely
- How to share a secret
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group
- On secret sharing systems
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Practical Threshold Signatures with Linear Secret Sharing Schemes