Sciweavers

530 search results - page 7 / 106
» Practical Threshold Signatures
Sort
View
WISA
2005
Springer
14 years 1 months ago
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes
Abstract. A proxy signature scheme allows an entity to delegate its signing power to another entity. Since the notion of proxy signatures was first introduced, many proxy signatur...
Je Hong Park, Bo Gyeong Kang, Sangwoo Park
ASIACRYPT
2001
Springer
14 years 18 days ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
CTRSA
2009
Springer
112views Cryptology» more  CTRSA 2009»
13 years 12 months ago
Divisible On-Line/Off-Line Signatures
On-line/Off-line signatures are used in a particular scenario where the signer must respond quickly once the message to be signed is presented. The idea is to split the signing pro...
Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming...
CTRSA
2001
Springer
120views Cryptology» more  CTRSA 2001»
14 years 18 days ago
Forward-Secure Threshold Signature Schemes
We consider the usage of forward security with threshold signature schemes. This means that even if more than the threshold number of players are compromised, some security remain...
Michel Abdalla, Sara K. Miner, Chanathip Namprempr...
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 8 months ago
A New Type of Designated Confirmer Signatures for a Group of Individuals
A new concept of society-oriented designated confirmer signatures (SDCS) is introduced in this paper. SDCS is well suited to applications where the capability of the signer and th...
Baodian Wei, Fangguo Zhang, Xiaofeng Chen