Results 1 to 10 of about 523,861 (163)
Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature [PDF]
Random beacons play a crucial role in blockchains. Most random beacons in a blockchain are performed in a distributed approach to secure the generation of random numbers.
Yan Zhu +6 more
doaj +2 more sources
The work presents a new signature scheme, called the multi-threshold signature, which generalizes the concept of multisignature and threshold signature.
Bartosz Nakielski +2 more
doaj +2 more sources
Universal composable threshold signature
Threshold signature allowed any subset of t parties generating a signature,but that disallowed the creation of a valid signature if fewer than t parties participate in the protocol.Since the security of threshold signature was only con-sidered in a ...
HONG Xuan1, CHEN Ke-fei2, LI Qiang2
doaj +3 more sources
Certificateless threshold signature from lattice
Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes are all based on traditional mathematic theory ...
Huifang Yu, Qi Zhang
doaj +2 more sources
Threshold Signature Schemes Application
This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva +1 more
doaj +1 more source
ID-based, Proxy, Threshold Signature Scheme [PDF]
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used
Jacek Pomykała +3 more
doaj +1 more source
Classical Communication Coset State (t,n) Threshold Quantum Digital Signature
In the field of quantum communication, classical communication processes have become a central open problem, especially in quantum threshold signature schemes.
Qingshui Xue +3 more
doaj +1 more source
Blockchain-based High-threshold Signature Protocol Integrating DKG and BLS [PDF]
Threshold signatures are fundamental tools for multi-party information security protocols.It is widely used in fields such as identity authentication,anti-counterfeiting and tamper-resistance.We introduce a new decentralized threshold signature protocol ...
LIU Feng, WANG Yi-fan, YANG Jie, ZHOU Ai-min, QI Jia-yin
doaj +1 more source
Robust Threshold DSS Signatures [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Gennaro, Rosario +3 more
openaire +1 more source
Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj +1 more source

