Results 141 to 150 of about 523,881 (183)
Some of the next articles are maybe not open access.
Threshold Signatures in Dynamic Groups
Future Generation Communication and Networking (FGCN 2007), 2007In this paper we present the efficient solution for the dynamical groups with the variable threshold bound. In fact we consider the more general situation, when there is a family of dynamical groups instead of one group. We were able to handle this more general situation by joining the secret sharing idea together with the certification system device ...
Jacek Pomykala, Tomasz Warchol
openaire +1 more source
Undeniable threshold proxy signature scheme
2013 5th International Conference on Computer Science and Information Technology, 2013The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group member to cooperatively sign message on behalf of an original signer. In this paper, we also propose a new scheme which includes the features and benefits of the RSA scheme which is a popular security technique.
Sattar J Aboud, Sufian Yousef, Mike Cole
openaire +1 more source
Optimal resilient threshold GQ signatures
Information Sciences, 2007zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chu, Cheng-Kang, Tzeng, Wen-Guey
openaire +1 more source
Short Threshold Dynamic Group Signatures
2020Traditional group signatures feature a single issuer who can add users to the group of signers and a single opening authority who can reveal the identity of the group member who computed a signature. Interestingly, despite being designed for privacy-preserving applications, they require strong trust in these central authorities who constitute single ...
Camenisch, Jan +4 more
openaire +1 more source
Threshold Undeniable RSA Signature Scheme
2001Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the concept of this special digital signature ten years ago. Up to now, however, almost all the existed schemes are based on discrete logarithm cryptosystems.
Guilin Wang +3 more
openaire +1 more source
Threshold proxy signature schemes
1998Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability efficiently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he ...
openaire +1 more source
A Threshold GQ Signature Scheme
2003We proposed the first threshold GQ signature scheme. The scheme is unforgeable and robust against any adaptive adversary if the base GQ signature scheme is unforgeable under the chosen message attack and computing the discrete logarithm modulo a safe prime is hard. Furthermore, our scheme can achieve optimal resilience by some modification.
Li-Shan Liu +2 more
openaire +1 more source
Efficient Forward-Secure Threshold Signatures
2020Forward-secure threshold signatures are useful to mitigate the damage of secret key exposure. Constructions based on bilinear pairings are particularly interesting because they achieve shorter signatures than RSA-based constructions.
openaire +1 more source
Separable Linkable Threshold Ring Signatures
2004A ring signature scheme is a group signature scheme with no group manager to setup a group or revoke a signer. A linkable ring signature, introduced by Liu, et al. [20], additionally allows anyone to determine if two ring signatures are signed by the same group member (a.k.a. they are linked). In this paper, we present the first separable linkable ring
Patrick P. Tsang +5 more
openaire +1 more source
HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures
Threshold variants of the Schnorr signature scheme have recently been at the center of attention due to their applications to Bitcoin, Ethereum, and other cryptocurrencies. However, existing constructions for threshold Schnorr signatures among a set of n parties with corruption threshold t_c suffer from at least one of the following drawbacks: (i ...Renas Bacho +3 more
openaire +1 more source

