Sciweavers

67 search results - page 7 / 14
» A Threshold GQ Signature Scheme
Sort
View
AINA
2005
IEEE
14 years 3 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...
INDOCRYPT
2004
Springer
14 years 3 months ago
New ID-Based Threshold Signature Scheme from Bilinear Pairings
ID-based public key systems allow the user to use his/her identity as the public key, which can simplify key management procedure compared with CA-based public key systems. However...
Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, ...
NDSS
2003
IEEE
14 years 2 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
CORR
2004
Springer
107views Education» more  CORR 2004»
13 years 9 months ago
A Directed Threshold - Signature Scheme
Sunder Lal, Manoj Kumar