Group-oriented (t, n) threshold digital signature scheme and digital multisignature

From MaRDI portal
Publication:4322312

DOI10.1049/ip-cdt:19941293zbMath0820.94016OpenAlexW2022848027MaRDI QIDQ4322312

Lein Harn

Publication date: 17 September 1995

Published in: IEE Proceedings - Computers and Digital Techniques (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1049/ip-cdt:19941293




Related Items (29)

New multisignature scheme for specified group of verifiersRound Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature CompressionWeaknesses in Some Threshold CryptosystemsEfficient discrete logarithm based multi-signature scheme in the plain public key modelReputation management and signature delegation: A distributed approachChain Reductions for Multi-signatures and the HBMS SchemeA verifiable framework of entanglement-free quantum secret sharing with information-theoretical securityA \((w, t, n)\)-weighted threshold dynamic quantum secret sharing scheme with cheating identificationA novel quantum \((t, n)\) threshold group signature based on \(d\)-dimensional quantum systemA Hybrid Threshold Group Signature Scheme with Distinguished Signing AuthorityNew multi-proxy multi-signature schemesAn XML multisignature scheme.Convertible multi-authenticated encryption schemeVerifiable threshold quantum secret sharing with sequential communicationID-based threshold digital signature schemes on the elliptic curve discrete logarithm problemCryptanalysis of ``an identity-based society oriented signature scheme with anonymous signersA Key Escrow-Free Identity-Based Signature Scheme without using Secure ChannelThreshold schemes from isogeny assumptionsImprovement of the Miyazaki-Takaragi threshold digital signature schemeThreshold-directed signature scheme based on hybrid number theoretic problemsSecure distributed storage and retrievalSimple Schnorr multi-signatures with applications to bitcoinCryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemesImprovements of generalization of threshold signature and authenticated encryption for group communicationsWeaknesses in some multisignature schemes for specified group of verifiers.Adaptively secure distributed public-key systems.Robust threshold DSS signaturesDynamic threshold secret reconstruction and its application to the threshold cryptography\textsf{CSI-RAShi}: distributed key generation for CSIDH




This page was built for publication: Group-oriented (t, n) threshold digital signature scheme and digital multisignature