Sciweavers

98 search results - page 13 / 20
» Threshold Proxy Signature Schemes
Sort
View
INDOCRYPT
2004
Springer
14 years 27 days ago
New ID-Based Threshold Signature Scheme from Bilinear Pairings
ID-based public key systems allow the user to use his/her identity as the public key, which can simplify key management procedure compared with CA-based public key systems. However...
Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, ...
CORR
2004
Springer
107views Education» more  CORR 2004»
13 years 7 months ago
A Directed Threshold - Signature Scheme
Sunder Lal, Manoj Kumar
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 7 months ago
A New Type of Designated Confirmer Signatures for a Group of Individuals
A new concept of society-oriented designated confirmer signatures (SDCS) is introduced in this paper. SDCS is well suited to applications where the capability of the signer and th...
Baodian Wei, Fangguo Zhang, Xiaofeng Chen
CTRSA
2009
Springer
112views Cryptology» more  CTRSA 2009»
13 years 11 months ago
Divisible On-Line/Off-Line Signatures
On-line/Off-line signatures are used in a particular scenario where the signer must respond quickly once the message to be signed is presented. The idea is to split the signing pro...
Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming...
EUROCRYPT
2008
Springer
13 years 9 months ago
Threshold RSA for Dynamic and Ad-Hoc Groups
Abstract--We consider the use of threshold signatures in adhoc and dynamic groups such as MANETs ("mobile ad-hoc networks"). We first show that known threshold RSA signat...
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal R...