Sciweavers

563 search results - page 18 / 113
» Verifiable Signature Sharing
Sort
View
ISCI
2010
79views more  ISCI 2010»
15 years 2 months ago
Strong (n, t, n) verifiable secret sharing scheme
Lein Harn, Changlu Lin
97
Voted
ISCI
2010
184views more  ISCI 2010»
15 years 23 days ago
A verifiable multi-secret sharing scheme based on cellular automata
Z. Eslami, J. Zarepour Ahmadabadi
ISW
2004
Springer
15 years 9 months ago
Chameleon Hashing Without Key Exposure
Abstract. Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon s...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
134
Voted
ASIACRYPT
2010
Springer
15 years 1 months ago
Constant-Size Commitments to Polynomials and Their Applications
We introduce and formally define polynomial commitment schemes, and provide two efficient constructions. A polynomial commitment scheme allows a committer to commit to a polynomial...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
145
Voted
COMPSEC
2004
99views more  COMPSEC 2004»
15 years 3 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...