A Trustless GQ Multi-signature Scheme with Identifiable Abort
From MaRDI portal
Publication:6488403
Recommendations
- Applied Cryptography and Network Security
- Secure multi-party computation with identifiable abort
- Efficient secure multiparty computation with identifiable abort
- Security of Blind Signatures under Aborts
- An identity traceable attribute-based multi-signature scheme
- Fiat-Shamir with aborts: from identification schemes to linkable ring signatures
- Security of blind signatures under aborts and applications to adaptive oblivious transfer
- Security analysis and improvement of the Abound multi-signature scheme
- A secure identity-based multi-proxy signature scheme
Cites work
- scientific article; zbMATH DE number 1583782 (Why is no real title available?)
- scientific article; zbMATH DE number 4191104 (Why is no real title available?)
- scientific article; zbMATH DE number 4170086 (Why is no real title available?)
- scientific article; zbMATH DE number 1088251 (Why is no real title available?)
- scientific article; zbMATH DE number 1942419 (Why is no real title available?)
- scientific article; zbMATH DE number 2086711 (Why is no real title available?)
- scientific article; zbMATH DE number 1842500 (Why is no real title available?)
- scientific article; zbMATH DE number 1406770 (Why is no real title available?)
- scientific article; zbMATH DE number 1456814 (Why is no real title available?)
- A distributed authentication algorithm based on GQ signature for mobile ad hoc networks
- Applied Cryptography and Network Security
- Bandwidth-efficient threshold EC-DSA
- Compact zero-knowledge proofs for threshold ECDSA with trustless setup
- Computational Science and Its Applications – ICCSA 2004
- Efficient signature generation by smart cards
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Identity-Based Multi-signatures from RSA
- MuSig2: simple two-round Schnorr multi-signatures
- Optimal resilient threshold GQ signatures
- Robust threshold DSS signatures
- Secure multi-party computation with identifiable abort
- Sequential Aggregate Signatures and Multisignatures Without Random Oracles
- Simple Schnorr multi-signatures with applications to bitcoin
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Two-party ECDSA from hash proof systems and efficient instantiations
This page was built for publication: A Trustless GQ Multi-signature Scheme with Identifiable Abort
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6488403)