A novel efficient (t,n) threshold proxy signature scheme
From MaRDI portal
Publication:2489232
DOI10.1016/J.INS.2005.02.010zbMATH Open1091.94033OpenAlexW2025713536MaRDI QIDQ2489232FDOQ2489232
Hui-Feng Huang, Chin-Chen Chang
Publication date: 16 May 2006
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2005.02.010
Recommendations
- scientific article; zbMATH DE number 2066187
- New threshold-proxy threshold-signature schemes
- scientific article; zbMATH DE number 2202168
- A new threshold proxy signature scheme with known signers
- Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability
Cites Work
Cited In (24)
- Attacks on provably secure proxy-protected signature schemes based on factoring
- A quantum proxy signature scheme based on genuine five-qubit entangled state
- Threshold-directed signature scheme based on hybrid number theoretic problems
- Title not available (Why is that?)
- A secure identity-based proxy multi-signature scheme
- A robust \((k,n)+1\) threshold proxy signature scheme based on factoring
- How to construct secure proxy cryptosystem
- A new threshold proxy signature scheme from bilinear pairings
- Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
- An enhanced \((t,n)\) threshold directed signature scheme
- Convertible multi-authenticated encryption scheme
- Hybrid proxy multisignature: a new type multi-party signature
- Verifiable multi-secret sharing based on LFSR sequences
- Efficient certificateless proxy signature scheme with provable security
- Threshold cryptography based on Asmuth-Bloom secret sharing
- Title not available (Why is that?)
- Delegation with supervision
- Certificateless threshold cryptosystem secure against chosen-ciphertext attack
- New efficient and practical verifiable multi-secret sharing schemes
- New threshold-proxy threshold-signature schemes
- New \((t, n)\) threshold directed signature scheme with provable security
- Practical Threshold Signatures with Linear Secret Sharing Schemes
- All-in-one group-oriented cryptosystem based on bilinear pairing
- Title not available (Why is that?)
This page was built for publication: A novel efficient \((t,n)\) threshold proxy signature scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2489232)