Sciweavers

78 search results - page 8 / 16
» Forward-Secure Threshold Signature Schemes
Sort
View
SIGOPS
2002
69views more  SIGOPS 2002»
13 years 7 months ago
On the value of threshold signatures
Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4]. The purpose of this paper is to present a rather simple alternative to threshol...
Niklas Borselius, Chris J. Mitchell, Aaron Wilson
ASIACRYPT
2001
Springer
14 years 8 days ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
EUROCRYPT
2001
Springer
14 years 7 days ago
Practical Threshold RSA Signatures without a Trusted Dealer
We propose a threshold RSA scheme which is as efficient as the fastest previous threshold RSA scheme (by Shoup), but where two assumptions needed in Shoup’s and in previous schem...
Ivan Damgård, Maciej Koprowski
IJNSEC
2006
98views more  IJNSEC 2006»
13 years 7 months ago
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDL...
Zuhua Shao
AINA
2005
IEEE
14 years 1 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...