Results 121 to 130 of about 342,314 (174)
Some of the next articles are maybe not open access.
Threshold Group Signature Scheme with Privilege Subjects Based on ECC
2010 International Conference on Communications and Intelligence Information Security, 2010This paper analyzes and studies of a threshold group signature scheme which is based on ElGamal type. In order to overcome the shortcomings of the scheme, a new threshold group signature scheme with privilege subjects based on ECC is proposed. The new scheme is able to prevent the fraud of key distribution center effectively.
Xueming Wang, Yurong Dong
openaire +2 more sources
An Approach to Convert Any Threshold Signature into a Threshold Group Signature
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 2007Guowen Li, Jia Yu, Rupeng Li, Daxing Li
openaire +2 more sources
Snowblind: A Threshold Blind Signature in Pairing-Free Groups
Annual International Cryptology Conference, 2023Elizabeth Crites +4 more
openaire +2 more sources
A Secure and Efficient Threshold Group Signature Scheme
Applied Mechanics, Mechatronics and Intelligent Systems, 2015Yansheng Zhang, Xueming Wang, Gege Qiu
openaire +2 more sources
Anonymous Traceability protocol based on Group Signature for Blockchain
Future generations computer systems, 2022In blockchain technology, data are stored on decentralized nodes and public to each node in the blockchain network. Hence, the focus of privacy protection in the blockchain guarantees the anonymity of transactions such that attackers cannot attain the ...
Bei Gong +5 more
semanticscholar +1 more source
Threshold Signatures in Dynamic Groups
Future Generation Communication and Networking (FGCN 2007), 2007In this paper we present the efficient solution for the dynamical groups with the variable threshold bound. In fact we consider the more general situation, when there is a family of dynamical groups instead of one group. We were able to handle this more general situation by joining the secret sharing idea together with the certification system device ...
Jacek Pomykala, Tomasz Warchol
openaire +1 more source
A secure threshold group signature scheme
Journal of Electronics (China), 2003The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed.
Xiaoming Wang, Fangwei Fu
openaire +1 more source
Short Threshold Dynamic Group Signatures
2020Traditional group signatures feature a single issuer who can add users to the group of signers and a single opening authority who can reveal the identity of the group member who computed a signature. Interestingly, despite being designed for privacy-preserving applications, they require strong trust in these central authorities who constitute single ...
Camenisch, Jan +4 more
openaire +1 more source
Democratic group signatures with threshold traceability
Journal of Shanghai Jiaotong University (Science), 2009This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of
Xiang-xue Li, Hai-feng Qian, Jian-hua Li
openaire +1 more source
Threshold untraceable signature for group communications
IEE Proceedings - Communications, 2004Lee et al. have proposed an untraceable (t, n) threshold signature scheme which can be extended to give the original signers the ability to prove they are the true signers. The present authors add the requirement of (k, l) threshold-shared verification to the scheme of Lee et al.
T.-Y. Chang, C.-C. Yang, M.-S. Hwang
openaire +1 more source

