Sciweavers

563 search results - page 18 / 113
» Verifiable Signature Sharing
Sort
View
ISCI
2010
79views more  ISCI 2010»
13 years 7 months ago
Strong (n, t, n) verifiable secret sharing scheme
Lein Harn, Changlu Lin
ISCI
2010
184views more  ISCI 2010»
13 years 6 months ago
A verifiable multi-secret sharing scheme based on cellular automata
Z. Eslami, J. Zarepour Ahmadabadi
ISW
2004
Springer
14 years 2 months ago
Chameleon Hashing Without Key Exposure
Abstract. Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon s...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
ASIACRYPT
2010
Springer
13 years 6 months ago
Constant-Size Commitments to Polynomials and Their Applications
We introduce and formally define polynomial commitment schemes, and provide two efficient constructions. A polynomial commitment scheme allows a committer to commit to a polynomial...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
COMPSEC
2004
99views more  COMPSEC 2004»
13 years 8 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...