Threshold undeniable signature scheme based on conic
From MaRDI portal
Publication:1763261
DOI10.1016/J.AMC.2003.12.084zbMATH Open1074.94009OpenAlexW2032661537MaRDI QIDQ1763261FDOQ1763261
Authors: Rongxing Lu, Zhenfu Cao, Yuan Zhou
Publication date: 22 February 2005
Published in: Applied Mathematics and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.amc.2003.12.084
Recommendations
Cites Work
- How to share a secret
- Efficient generation of shared RSA keys
- Title not available (Why is that?)
- Practical threshold signatures
- Title not available (Why is that?)
- Designated verifier proofs and their applications
- Undeniable Signatures
- Weaknesses of Undeniable Signature Schemes
- Title not available (Why is that?)
- Proving without knowing: on oblivious, agnostic and blindfolded provers
- New convertible undeniable signature schemes
- Convertible Undeniable Signatures
- Title not available (Why is that?)
- Distributed Provers with Applications to Undeniable Signatures
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Interactive Bi-Proof Systems and Undeniable Signature Schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (4)
This page was built for publication: Threshold undeniable signature scheme based on conic
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1763261)