Sciweavers

98 search results - page 6 / 20
» Undetachable Threshold Signatures
Sort
View
CTRSA
2001
Springer
120views Cryptology» more  CTRSA 2001»
13 years 12 months ago
Forward-Secure Threshold Signature Schemes
We consider the usage of forward security with threshold signature schemes. This means that even if more than the threshold number of players are compromised, some security remain...
Michel Abdalla, Sara K. Miner, Chanathip Namprempr...
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 7 months ago
A New Type of Designated Confirmer Signatures for a Group of Individuals
A new concept of society-oriented designated confirmer signatures (SDCS) is introduced in this paper. SDCS is well suited to applications where the capability of the signer and th...
Baodian Wei, Fangguo Zhang, Xiaofeng Chen
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 6 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
PR
1998
97views more  PR 1998»
13 years 7 months ago
On-line signature verification based on logarithmic spectrum
—In this paper, an on-line signature verification scheme based on similarity measurement of logarithmic spectrum is proposed. The principal components of the logarithmic spectru...
Quen-Zong Wu, Suh-Yin Lee, I-Chang Jou
IJNSEC
2006
98views more  IJNSEC 2006»
13 years 7 months ago
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDL...
Zuhua Shao