Results 121 to 130 of about 342,314 (174)
Some of the next articles are maybe not open access.

Threshold Group Signature Scheme with Privilege Subjects Based on ECC

2010 International Conference on Communications and Intelligence Information Security, 2010
This paper analyzes and studies of a threshold group signature scheme which is based on ElGamal type. In order to overcome the shortcomings of the scheme, a new threshold group signature scheme with privilege subjects based on ECC is proposed. The new scheme is able to prevent the fraud of key distribution center effectively.
Xueming Wang, Yurong Dong
openaire   +2 more sources

An Approach to Convert Any Threshold Signature into a Threshold Group Signature

Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 2007
Guowen Li, Jia Yu, Rupeng Li, Daxing Li
openaire   +2 more sources

Snowblind: A Threshold Blind Signature in Pairing-Free Groups

Annual International Cryptology Conference, 2023
Elizabeth Crites   +4 more
openaire   +2 more sources

A Secure and Efficient Threshold Group Signature Scheme

Applied Mechanics, Mechatronics and Intelligent Systems, 2015
Yansheng Zhang, Xueming Wang, Gege Qiu
openaire   +2 more sources

Anonymous Traceability protocol based on Group Signature for Blockchain

Future generations computer systems, 2022
In blockchain technology, data are stored on decentralized nodes and public to each node in the blockchain network. Hence, the focus of privacy protection in the blockchain guarantees the anonymity of transactions such that attackers cannot attain the ...
Bei Gong   +5 more
semanticscholar   +1 more source

Threshold Signatures in Dynamic Groups

Future Generation Communication and Networking (FGCN 2007), 2007
In this paper we present the efficient solution for the dynamical groups with the variable threshold bound. In fact we consider the more general situation, when there is a family of dynamical groups instead of one group. We were able to handle this more general situation by joining the secret sharing idea together with the certification system device ...
Jacek Pomykala, Tomasz Warchol
openaire   +1 more source

A secure threshold group signature scheme

Journal of Electronics (China), 2003
The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed.
Xiaoming Wang, Fangwei Fu
openaire   +1 more source

Short Threshold Dynamic Group Signatures

2020
Traditional group signatures feature a single issuer who can add users to the group of signers and a single opening authority who can reveal the identity of the group member who computed a signature. Interestingly, despite being designed for privacy-preserving applications, they require strong trust in these central authorities who constitute single ...
Camenisch, Jan   +4 more
openaire   +1 more source

Democratic group signatures with threshold traceability

Journal of Shanghai Jiaotong University (Science), 2009
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of
Xiang-xue Li, Hai-feng Qian, Jian-hua Li
openaire   +1 more source

Threshold untraceable signature for group communications

IEE Proceedings - Communications, 2004
Lee et al. have proposed an untraceable (t, n) threshold signature scheme which can be extended to give the original signers the ability to prove they are the true signers. The present authors add the requirement of (k, l) threshold-shared verification to the scheme of Lee et al.
T.-Y. Chang, C.-C. Yang, M.-S. Hwang
openaire   +1 more source

Home - About - Disclaimer - Privacy