Practical Threshold Signatures Without Random Oracles
From MaRDI portal
Publication:3503882
DOI10.1007/978-3-540-75670-5_14zbMath1138.94383OpenAlexW1819508773MaRDI QIDQ3503882
Kwangjo Kim, Jin Li, Tsz Hon Yuen
Publication date: 10 June 2008
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-75670-5_14
Related Items (4)
Signcryption schemes with threshold unsigncryption, and applications ⋮ Non-interactive identity-based threshold signature scheme without random oracles ⋮ Certificateless threshold signature secure in the standard model ⋮ Practical (fully) distributed signatures provably secure in the standard model
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Securing threshold cryptosystems against chosen ciphertext attack
- Robust threshold DSS signatures
- How to share a secret
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Short Threshold Signature Schemes Without Random Oracles
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Practical Threshold Signatures Without Random Oracles