Results 111 to 120 of about 342,314 (174)
Some of the next articles are maybe not open access.

Quantum threshold group signature

Science in China Series G: Physics, Mechanics and Astronomy, 2008
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signature is a solution to this problem.
YuGuang Yang, QiaoYan Wen
openaire   +2 more sources

Threshold Ring Signature Scheme from Cryptographic Group Action

Provable Security, 2023
A threshold ring signature (t-out-of-N) is an extension of ring signatures that allow t users jointly sign a message on the behalf of N users, selected in an arbitrary manner, while keeping their identities anonymous. This paper presents a construction of threshold ring signature from cryptographic group action, based on the OR proof of group action ...
Pham, Minh Thuy Truc   +3 more
openaire   +3 more sources

Improvement of Threshold Group Signature Scheme

2011 International Symposium on Computer Science and Society, 2011
A (t,n) threshold group signature scheme allows a singer to determine a (t,n) threshold strategy and only t or more signers of the group can sign messages on behalf of the group. Recently, Li et al. proposed a new threshold group signature scheme based on discrete logarithm problem, which is not only threshold-signing but also threshold-verifying ...
Tong Lu, Baoyuan Kang
openaire   +2 more sources

Multivariate threshold group signature scheme withstanding conspiracy attack

2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment, 2012
Threshold signature has important significance. However, the security and impeccable threshold group signature schemes are rarely. In this paper, a multivariate threshold group signature scheme is proposed. After the analysis, a conspiracy attack scheme which could offer forgery attacks to the signature system has been proposed. Then, the paper gives a
Yu Tao, Yatao Yang, Zichen Li, Xin Zheng
openaire   +2 more sources

A New ID-Based Threshold Group Signature Scheme

2012 8th International Conference on Wireless Communications, Networking and Mobile Computing, 2012
A (t,n) threshold group signature scheme allows a singer to determine a (t,n) threshold strategy and only t or more signers of the group can sign messages on behalf of the group. In this paper, we proposed a new ID-based threshold group signature scheme based on discrete logarithm problem, which not only satisfies all the secure requirements but also ...
Zhiqiang Zhang, Yunlong Ye
openaire   +2 more sources

Identity-Based Threshold Group Signature Scheme of Blockchain Verification

2020
In the e-commerce scenario, the signature schemes generally have to meet four requirements: public verification, integrity, traceable and efficiency. To achieve the above goals, the paper proposes a identity-based threshold group signature scheme which can not only simplify the process of key management, but also allow to trace the user identities.
Lipeng Wang   +6 more
openaire   +2 more sources

A Voting Scheme in Blockchain Based on Threshold Group Signature

Communications in Computer and Information Science, 2019
Traditional voting schemes are used for the credit evaluation and authentication. During the voting process, the contents need to be verified through the signature algorithms. Traditional signature schemes for voting scenes exist several drawbacks such as distrust of central nodes for the group signature and inefficiency for the ring signature.
Lipeng Wang   +6 more
openaire   +2 more sources

An ID-based (k, t, n) Threshold Group Signature Scheme

2011 Seventh International Conference on Computational Intelligence and Security, 2011
The threshold signature as an important branch of digital signature has grown to become one of the most popular and prolific field of study. This paper introduced an identity-based (k, t, n) threshold group signature scheme that uses bilinear pairings and secret sharing.
Wei Fu, Guang-liang Liu
openaire   +2 more sources

A Group of Threshold Group-Signature Schemes with Privilege Subsets

2006
Reference[9] proposed a threshold group-signature scheme in order to solve the problem so called “threshold group-signature scheme with privilege subsets” suggested by Feng Dengguo. We firstly show there exist some insufficiencies and potential hazard in the scheme mentioned above.
Chen Weidong, Feng Dengguo
openaire   +2 more sources

A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority

2018
This paper proposes a new hybrid threshold group signature scheme with distinguished signing authority to provide all proof of member signing processes in case of dispute internally and internal integrity of multisignature generation process. In practical, the proposed scheme has more controls to an organization by using the threshold mechanism and ...
Dao Tuan Hung   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy