Cryptanalysis of threshold-proxy threshold-signature schemes
From MaRDI portal
Publication:3017300
Recommendations
Cited in
(18)- Cryptanalysis of an identity-based proxy signature scheme in standard model
- New threshold-proxy threshold-signature schemes
- Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
- Security analysis of the Pomykala-Barabasz scheme
- Security Weaknesses in Two Proxy Signature Schemes
- Insider attacks on multi-proxy multi-signature schemes
- Cryptanalysis of proxy blind signature scheme
- Breaking Pomykala-Barabasz threshold proxy signature scheme
- CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME
- scientific article; zbMATH DE number 1876856 (Why is no real title available?)
- Information Security Practice and Experience
- Attacks on threshold signature schemes with traceable signers
- scientific article; zbMATH DE number 2222201 (Why is no real title available?)
- Improvement of identity-based threshold proxy signature scheme with known signers
- Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
- A new nonrepudiable threshold proxy signature scheme
- Improvement of threshold proxy signature scheme
- Information Security and Cryptology
This page was built for publication: Cryptanalysis of threshold-proxy threshold-signature schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3017300)