Group-oriented (t, n) threshold digital signature scheme and digital multisignature
From MaRDI portal
Publication:4322312
DOI10.1049/ip-cdt:19941293zbMath0820.94016OpenAlexW2022848027MaRDI QIDQ4322312
Publication date: 17 September 1995
Published in: IEE Proceedings - Computers and Digital Techniques (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1049/ip-cdt:19941293
Related Items (29)
New multisignature scheme for specified group of verifiers ⋮ Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression ⋮ Weaknesses in Some Threshold Cryptosystems ⋮ Efficient discrete logarithm based multi-signature scheme in the plain public key model ⋮ Reputation management and signature delegation: A distributed approach ⋮ Chain Reductions for Multi-signatures and the HBMS Scheme ⋮ A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security ⋮ A \((w, t, n)\)-weighted threshold dynamic quantum secret sharing scheme with cheating identification ⋮ A novel quantum \((t, n)\) threshold group signature based on \(d\)-dimensional quantum system ⋮ A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority ⋮ New multi-proxy multi-signature schemes ⋮ An XML multisignature scheme. ⋮ Convertible multi-authenticated encryption scheme ⋮ Verifiable threshold quantum secret sharing with sequential communication ⋮ ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem ⋮ Cryptanalysis of ``an identity-based society oriented signature scheme with anonymous signers ⋮ A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel ⋮ Threshold schemes from isogeny assumptions ⋮ Improvement of the Miyazaki-Takaragi threshold digital signature scheme ⋮ Threshold-directed signature scheme based on hybrid number theoretic problems ⋮ Secure distributed storage and retrieval ⋮ Simple Schnorr multi-signatures with applications to bitcoin ⋮ Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes ⋮ Improvements of generalization of threshold signature and authenticated encryption for group communications ⋮ Weaknesses in some multisignature schemes for specified group of verifiers. ⋮ Adaptively secure distributed public-key systems. ⋮ Robust threshold DSS signatures ⋮ Dynamic threshold secret reconstruction and its application to the threshold cryptography ⋮ \textsf{CSI-RAShi}: distributed key generation for CSIDH
This page was built for publication: Group-oriented (t, n) threshold digital signature scheme and digital multisignature