An efficient threshold key-insulated signature scheme
From MaRDI portal
Publication:2440174
DOI10.1007/S12204-011-1207-3zbMATH Open1283.94091OpenAlexW1497084183MaRDI QIDQ2440174FDOQ2440174
Authors: Jian-hong Chen, Yu Long, Yongtao Wang, Kefei Chen, Xiangxue Li
Publication date: 27 March 2014
Published in: Journal of Shanghai Jiaotong University (Science) (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12204-011-1207-3
Recommendations
- An Efficient Strong Key-Insulated Signature Scheme and Its Application
- Efficient forward-secure threshold signatures
- An efficient certificateless threshold signcryption scheme
- A secure and efficient directed threshold signature scheme
- Information Security and Privacy
- A secure and efficient identity-based threshold signcryption scheme
- An efficient threshold RSA digital signature scheme
- Information and Communications Security
- scientific article; zbMATH DE number 1759662
- Information Security
Cites Work
Cited In (11)
- Identity-Based Key-Insulated Signature with Secure Key-Updates
- An Efficient Strong Key-Insulated Signature Scheme and Its Application
- Information Security
- An enhanced \((t,n)\) threshold directed signature scheme
- Optimal resilient threshold GQ signatures
- Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms
- Information Security and Privacy
- Efficient forward-secure threshold signatures
- Cryptography and Coding
- Applied Cryptography and Network Security
- Strong Key-Insulated Signature Schemes
This page was built for publication: An efficient threshold key-insulated signature scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2440174)