Group-oriented (t, n) threshold digital signature scheme and digital multisignature

From MaRDI portal
Publication:4322312


DOI10.1049/ip-cdt:19941293zbMath0820.94016MaRDI QIDQ4322312

Lein Harn

Publication date: 17 September 1995

Published in: IEE Proceedings - Computers and Digital Techniques (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1049/ip-cdt:19941293


68Q25: Analysis of algorithms and problem complexity

94A60: Cryptography


Related Items

Threshold-directed signature scheme based on hybrid number theoretic problems, Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression, A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority, Chain Reductions for Multi-signatures and the HBMS Scheme, ID-based threshold digital signature schemes on the elliptic curve discrete logarithm problem, Efficient discrete logarithm based multi-signature scheme in the plain public key model, Reputation management and signature delegation: A distributed approach, Cryptanalysis of ``an identity-based society oriented signature scheme with anonymous signers, Improvement of the Miyazaki-Takaragi threshold digital signature scheme, New multi-proxy multi-signature schemes, An XML multisignature scheme., Secure distributed storage and retrieval, Improvements of generalization of threshold signature and authenticated encryption for group communications, Weaknesses in some multisignature schemes for specified group of verifiers., Adaptively secure distributed public-key systems., Robust threshold DSS signatures, New multisignature scheme for specified group of verifiers, Verifiable threshold quantum secret sharing with sequential communication, Threshold schemes from isogeny assumptions, \textsf{CSI-RAShi}: distributed key generation for CSIDH, Simple Schnorr multi-signatures with applications to bitcoin, Dynamic threshold secret reconstruction and its application to the threshold cryptography, Convertible multi-authenticated encryption scheme, Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes, A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security, A \((w, t, n)\)-weighted threshold dynamic quantum secret sharing scheme with cheating identification, A novel quantum \((t, n)\) threshold group signature based on \(d\)-dimensional quantum system, A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel, Weaknesses in Some Threshold Cryptosystems