Results 261 to 270 of about 528,126 (280)
Some of the next articles are maybe not open access.
New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software, 2001Chien-Lung Hsu
exaly
ID-Based Threshold Signature and Mediated Signature Schemes
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 2007Yong Yu, Bo Yang, Ying Sun
openaire +1 more source
A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Future Generation Computer Systems, 2004Min-Shiang Hwang
exaly
Threshold signatures from VOLE
The focus of this thesis is on threshold digital signatures and in particular on Schnorr signatures (1991). Following the expiration of its patent in 2008, Schnorr signature has gained significance in the realm of digital signatures due to its simplicity, provable security, and linear structure.openaire +1 more source
A practical (t, n) threshold proxy signature scheme based on the rsa cryptosystem
IEEE Transactions on Knowledge and Data Engineering, 2003Min-Shiang Hwang
exaly
Threshold proxy quantum signature scheme with threshold shared verification
Science in China Series G: Physics, Mechanics and Astronomy, 2008Yu-Guang Yang, Qiao-Yan Wen
exaly
New (t,n) threshold directed signature scheme with provable security
Information Sciences, 2008Xiaodong Lin, Zhenfu Cao, Xiaohui Liang
exaly
Threshold Signatures with Private Accountability
2022Dan Boneh, Chelsea Komlo
openaire +1 more source
Threshold signature schemes with traceable signers in group communications
Computer Communications, 1998Chu-Hsing Lin, Chin-Chen Chang
exaly

