Group-oriented (t, n) threshold digital signature scheme and digital multisignature

From MaRDI portal
Revision as of 21:49, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4322312

DOI10.1049/ip-cdt:19941293zbMath0820.94016OpenAlexW2022848027MaRDI QIDQ4322312

Lein Harn

Publication date: 17 September 1995

Published in: IEE Proceedings - Computers and Digital Techniques (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1049/ip-cdt:19941293



Related Items

New multisignature scheme for specified group of verifiers, Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression, Weaknesses in Some Threshold Cryptosystems, Efficient discrete logarithm based multi-signature scheme in the plain public key model, Reputation management and signature delegation: A distributed approach, Chain Reductions for Multi-signatures and the HBMS Scheme, A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security, A \((w, t, n)\)-weighted threshold dynamic quantum secret sharing scheme with cheating identification, A novel quantum \((t, n)\) threshold group signature based on \(d\)-dimensional quantum system, A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority, New multi-proxy multi-signature schemes, An XML multisignature scheme., Convertible multi-authenticated encryption scheme, Verifiable threshold quantum secret sharing with sequential communication, ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem, Cryptanalysis of ``an identity-based society oriented signature scheme with anonymous signers, A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel, Threshold schemes from isogeny assumptions, Improvement of the Miyazaki-Takaragi threshold digital signature scheme, Threshold-directed signature scheme based on hybrid number theoretic problems, Secure distributed storage and retrieval, Simple Schnorr multi-signatures with applications to bitcoin, Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes, Improvements of generalization of threshold signature and authenticated encryption for group communications, Weaknesses in some multisignature schemes for specified group of verifiers., Adaptively secure distributed public-key systems., Robust threshold DSS signatures, Dynamic threshold secret reconstruction and its application to the threshold cryptography, \textsf{CSI-RAShi}: distributed key generation for CSIDH