Results 131 to 140 of about 523,881 (183)
Some of the next articles are maybe not open access.
IEE Proceedings - Computers and Digital Techniques, 1999
A (t, n) threshold proxy signature scheme allows t or more proxy signers from a designated group of n proxy signers to sign messages on behalf of an original signer. The authors review both Zhang's threshold proxy signature scheme and Kim's threshold proxy signature scheme.
H. -M. Sun, N. -Y. Lee, T. Hwang
openaire +1 more source
A (t, n) threshold proxy signature scheme allows t or more proxy signers from a designated group of n proxy signers to sign messages on behalf of an original signer. The authors review both Zhang's threshold proxy signature scheme and Kim's threshold proxy signature scheme.
H. -M. Sun, N. -Y. Lee, T. Hwang
openaire +1 more source
New threshold-proxy threshold-signature schemes
Computers & Electrical Engineering, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hwang, Shin-Jia, Chen, Chiu-Chin
openaire +1 more source
Quantum Proxy Threshold Multiple Signature Scheme
International Journal of Theoretical Physics, 2021zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jing Yu, Jianhua Zhang
openaire +2 more sources
Confessible Threshold Ring Signatures
2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006We present two threshold ring signature schemes with different properties. One focuses on the confessibility (or signer verifiability) and the denouncibility properties. The other focuses on the threshold-confessibility. Our schemes are built on generic ring signature schemes and can be easily adapted to most existing ring signature schemes.
Yu-shian Chen +3 more
openaire +1 more source
Identity Based Threshold Ring Signature
2005In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n – t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet the actual signers remain anonymous. The spontaneity of these schemes is desirable for ad-hoc groups such as mobile ad-hoc networks.
Yiu, SM, Chow, SSM, Hui, LCK
openaire +2 more sources
Quantum threshold group signature
Science in China Series G: Physics, Mechanics and Astronomy, 2008In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signature is a solution to this problem.
YuGuang Yang, QiaoYan Wen
openaire +1 more source
Threshold Discernible Ring Signatures
2012A ring signature [1] demonstrates that the signer who produced it is among a group A of n people, called a ring. A signer may produce a ring signature on any ring A he is part of, arbitrarily without any setup procedure or the consent of anyone in A. Several extensions of ring signatures have been proposed in literature.
Swarun Kumar +4 more
openaire +1 more source
Certificateless Threshold Signature Schemes
2005We analyze the relationship and subtle difference between the notion of certificateless public key cryptography (CL-PKC) and identity-based schemes without a trusted private key generator (PKG), then propose a certificateless threshold signature scheme based on bilinear pairings.
Licheng Wang +3 more
openaire +1 more source
Rerandomizable Threshold Blind Signatures
2015This paper formalizes the concept of threshold blind signatures TBS that bridges together properties of the two well-known signature flavors, blind signatures and threshold signatures. Using TBS users can obtain signatures through interaction with t-out-of-n signers without disclosing the corresponding message to any of them.
Kuchta, Veronika, Manulis, Mark
openaire +1 more source
Threshold Entrusted Undeniable Signature
2005Entrusted undeniable signatures are like undeniable signatures, except that the disavowal protocol can only be run by a court in order to resolve a formal dispute. This paper introduces threshold entrusted undeniable signature scheme without trusted center.
Seungjoo Kim, Dongho Won
openaire +1 more source

