Results 1 to 10 of about 523,861 (163)

Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature [PDF]

open access: yesSensors, 2022
Random beacons play a crucial role in blockchains. Most random beacons in a blockchain are performed in a distributed approach to secure the generation of random numbers.
Yan Zhu   +6 more
doaj   +2 more sources

Multi-threshold signature

open access: yesJournal of Telecommunications and Information Technology, 2023
The work presents a new signature scheme, called the multi-threshold signature, which generalizes the concept of multisignature and threshold signature.
Bartosz Nakielski   +2 more
doaj   +2 more sources

Universal composable threshold signature

open access: yesTongxin xuebao, 2009
Threshold signature allowed any subset of t parties generating a signature,but that disallowed the creation of a valid signature if fewer than t parties participate in the protocol.Since the security of threshold signature was only con-sidered in a ...
HONG Xuan1, CHEN Ke-fei2, LI Qiang2
doaj   +3 more sources

Certificateless threshold signature from lattice

open access: yesDigital Communications and Networks
Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes are all based on traditional mathematic theory ...
Huifang Yu, Qi Zhang
doaj   +2 more sources

Threshold Signature Schemes Application

open access: yesБезопасность информационных технологий, 2015
This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were ...
Anastasiya Victorovna Beresneva   +1 more
doaj   +1 more source

ID-based, Proxy, Threshold Signature Scheme [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used
Jacek Pomykała   +3 more
doaj   +1 more source

Classical Communication Coset State (t,n) Threshold Quantum Digital Signature

open access: yesIEEE Access, 2023
In the field of quantum communication, classical communication processes have become a central open problem, especially in quantum threshold signature schemes.
Qingshui Xue   +3 more
doaj   +1 more source

Blockchain-based High-threshold Signature Protocol Integrating DKG and BLS [PDF]

open access: yesJisuanji kexue, 2021
Threshold signatures are fundamental tools for multi-party information security protocols.It is widely used in fields such as identity authentication,anti-counterfeiting and tamper-resistance.We introduce a new decentralized threshold signature protocol ...
LIU Feng, WANG Yi-fan, YANG Jie, ZHOU Ai-min, QI Jia-yin
doaj   +1 more source

Robust Threshold DSS Signatures [PDF]

open access: yesInformation and Computation, 1996
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Gennaro, Rosario   +3 more
openaire   +1 more source

Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]

open access: yesJisuanji gongcheng, 2016
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj   +1 more source

Home - About - Disclaimer - Privacy