Sciweavers

1094 search results - page 5 / 219
» List signature schemes
Sort
View
EUROCRYPT
2000
Springer
14 years 5 days ago
Practical Threshold Signatures
We present an RSA threshold signature scheme. The scheme enjoys the following properties:
Victor Shoup
PROVSEC
2009
Springer
14 years 3 months ago
Anonymous Signatures Revisited
Abstract. We revisit the notion of the anonymous signature, first formalized by Yang, Wong, Deng and Wang [12], and then further developed by Fischlin [6] and Zhang and Imai [13]. ...
Vishal Saraswat, Aaram Yun
ISPEC
2005
Springer
14 years 2 months ago
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can ...
Zuowen Tan, Zhuojun Liu, Wang Mingsheng
IJNSEC
2008
129views more  IJNSEC 2008»
13 years 8 months ago
Repairing Efficient Threshold Group Signature Scheme
To enhance the efficiency of threshold group signature schemes, Yu and Chen, recently, proposed an efficient threshold group signature scheme. By using elliptic curves, the propos...
Zuhua Shao
IJNSEC
2006
122views more  IJNSEC 2006»
13 years 8 months ago
A Directed Signature Scheme Based on RSA Assumption
A directed signature scheme allows a designated verifier to directly verify a signature issued to him, and a third party to check the signature validity with the help of the signe...
Rongxing Lu, Zhenfu Cao