Cryptanalysis of threshold-proxy threshold-signature schemes
From MaRDI portal
Publication:3017300
zbMATH Open1240.94070MaRDI QIDQ3017300FDOQ3017300
Publication date: 19 July 2011
Recommendations
Cited In (15)
- Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
- Improvement of identity-based threshold proxy signature scheme with known signers
- Attacks on threshold signature schemes with traceable signers
- Title not available (Why is that?)
- Title not available (Why is that?)
- Insider attacks on multi-proxy multi-signature schemes
- Cryptanalysis of proxy blind signature scheme
- Information Security and Cryptology
- A new nonrepudiable threshold proxy signature scheme
- Improvement of threshold proxy signature scheme
- Security analysis of the Pomykala-Barabasz scheme
- CONSPIRACY ATTACKS ON THE THRESHOLD RSA SIGNATURE SCHEME
- New threshold-proxy threshold-signature schemes
- Information Security Practice and Experience
- Security Weaknesses in Two Proxy Signature Schemes
This page was built for publication: Cryptanalysis of threshold-proxy threshold-signature schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3017300)