Attacks on threshold signature schemes with traceable signers
From MaRDI portal
(Redirected from Publication:1606952)
Recommendations
- Applied Cryptography and Network Security
- scientific article; zbMATH DE number 1149903
- Threshold kleptographic attacks on discrete logarithm based signatures
- CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME
- Cryptanalysis of threshold-proxy threshold-signature schemes
- Differential attacks on deterministic signatures
- Security of Wang et al. 's group-oriented (t,n) threshold signature schemes with traceable signers
- Attack on a concast signature scheme
- Information Security and Cryptology
- A threshold signature scheme based on elliptic curve with traceability
Cited in
(9)- Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03
- An efficient threshold RSA digital signature scheme
- A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority
- Applied Cryptography and Network Security
- A Countermeasure for Protecting NTRUSign against the Transcript Attack
- Security of Wang et al. 's group-oriented (t,n) threshold signature schemes with traceable signers
- CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME
- scientific article; zbMATH DE number 1700049 (Why is no real title available?)
- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
This page was built for publication: Attacks on threshold signature schemes with traceable signers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1606952)