Attacks on threshold signature schemes with traceable signers
From MaRDI portal
Publication:1606952
DOI10.1016/S0020-0190(99)00078-2zbMATH Open1006.94527OpenAlexW2050455070MaRDI QIDQ1606952FDOQ1606952
Authors: Yuh-Min Tseng, Jinn-Ke Jan
Publication date: 25 July 2002
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s0020-0190(99)00078-2
Recommendations
- Applied Cryptography and Network Security
- scientific article; zbMATH DE number 1149903
- Threshold kleptographic attacks on discrete logarithm based signatures
- CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME
- Cryptanalysis of threshold-proxy threshold-signature schemes
- Differential attacks on deterministic signatures
- Security of Wang et al. 's group-oriented \((t,n)\) threshold signature schemes with traceable signers
- Attack on a concast signature scheme
- Information Security and Cryptology
- A threshold signature scheme based on elliptic curve with traceability
Cited In (9)
- Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03
- An efficient threshold RSA digital signature scheme
- A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority
- Applied Cryptography and Network Security
- A Countermeasure for Protecting NTRUSign against the Transcript Attack
- Security of Wang et al. 's group-oriented \((t,n)\) threshold signature schemes with traceable signers
- CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME
- Title not available (Why is that?)
- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
This page was built for publication: Attacks on threshold signature schemes with traceable signers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1606952)