Group-oriented (t, n) threshold digital signature scheme and digital multisignature
From MaRDI portal
Publication:4322312
DOI10.1049/ip-cdt:19941293zbMath0820.94016OpenAlexW2022848027MaRDI QIDQ4322312
Publication date: 17 September 1995
Published in: IEE Proceedings - Computers and Digital Techniques (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1049/ip-cdt:19941293
Related Items
New multisignature scheme for specified group of verifiers, Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression, Weaknesses in Some Threshold Cryptosystems, Efficient discrete logarithm based multi-signature scheme in the plain public key model, Reputation management and signature delegation: A distributed approach, Chain Reductions for Multi-signatures and the HBMS Scheme, A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security, A \((w, t, n)\)-weighted threshold dynamic quantum secret sharing scheme with cheating identification, A novel quantum \((t, n)\) threshold group signature based on \(d\)-dimensional quantum system, A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority, New multi-proxy multi-signature schemes, An XML multisignature scheme., Convertible multi-authenticated encryption scheme, Verifiable threshold quantum secret sharing with sequential communication, ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem, Cryptanalysis of ``an identity-based society oriented signature scheme with anonymous signers, A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel, Threshold schemes from isogeny assumptions, Improvement of the Miyazaki-Takaragi threshold digital signature scheme, Threshold-directed signature scheme based on hybrid number theoretic problems, Secure distributed storage and retrieval, Simple Schnorr multi-signatures with applications to bitcoin, Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes, Improvements of generalization of threshold signature and authenticated encryption for group communications, Weaknesses in some multisignature schemes for specified group of verifiers., Adaptively secure distributed public-key systems., Robust threshold DSS signatures, Dynamic threshold secret reconstruction and its application to the threshold cryptography, \textsf{CSI-RAShi}: distributed key generation for CSIDH