Results 141 to 150 of about 523,881 (183)
Some of the next articles are maybe not open access.

Threshold Signatures in Dynamic Groups

Future Generation Communication and Networking (FGCN 2007), 2007
In this paper we present the efficient solution for the dynamical groups with the variable threshold bound. In fact we consider the more general situation, when there is a family of dynamical groups instead of one group. We were able to handle this more general situation by joining the secret sharing idea together with the certification system device ...
Jacek Pomykala, Tomasz Warchol
openaire   +1 more source

Undeniable threshold proxy signature scheme

2013 5th International Conference on Computer Science and Information Technology, 2013
The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group member to cooperatively sign message on behalf of an original signer. In this paper, we also propose a new scheme which includes the features and benefits of the RSA scheme which is a popular security technique.
Sattar J Aboud, Sufian Yousef, Mike Cole
openaire   +1 more source

Optimal resilient threshold GQ signatures

Information Sciences, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chu, Cheng-Kang, Tzeng, Wen-Guey
openaire   +1 more source

Short Threshold Dynamic Group Signatures

2020
Traditional group signatures feature a single issuer who can add users to the group of signers and a single opening authority who can reveal the identity of the group member who computed a signature. Interestingly, despite being designed for privacy-preserving applications, they require strong trust in these central authorities who constitute single ...
Camenisch, Jan   +4 more
openaire   +1 more source

Threshold Undeniable RSA Signature Scheme

2001
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the concept of this special digital signature ten years ago. Up to now, however, almost all the existed schemes are based on discrete logarithm cryptosystems.
Guilin Wang   +3 more
openaire   +1 more source

Threshold proxy signature schemes

1998
Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability efficiently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he ...
openaire   +1 more source

A Threshold GQ Signature Scheme

2003
We proposed the first threshold GQ signature scheme. The scheme is unforgeable and robust against any adaptive adversary if the base GQ signature scheme is unforgeable under the chosen message attack and computing the discrete logarithm modulo a safe prime is hard. Furthermore, our scheme can achieve optimal resilience by some modification.
Li-Shan Liu   +2 more
openaire   +1 more source

Efficient Forward-Secure Threshold Signatures

2020
Forward-secure threshold signatures are useful to mitigate the damage of secret key exposure. Constructions based on bilinear pairings are particularly interesting because they achieve shorter signatures than RSA-based constructions.
openaire   +1 more source

Separable Linkable Threshold Ring Signatures

2004
A ring signature scheme is a group signature scheme with no group manager to setup a group or revoke a signer. A linkable ring signature, introduced by Liu, et al. [20], additionally allows anyone to determine if two ring signatures are signed by the same group member (a.k.a. they are linked). In this paper, we present the first separable linkable ring
Patrick P. Tsang   +5 more
openaire   +1 more source

HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures

Threshold variants of the Schnorr signature scheme have recently been at the center of attention due to their applications to Bitcoin, Ethereum, and other cryptocurrencies. However, existing constructions for threshold Schnorr signatures among a set of n parties with corruption threshold t_c suffer from at least one of the following drawbacks: (i ...
Renas Bacho   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy