Sciweavers

67 search results - page 7 / 14
» A Threshold GQ Signature Scheme
Sort
View
AINA
2005
IEEE
15 years 6 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...
INDOCRYPT
2004
Springer
15 years 6 months ago
New ID-Based Threshold Signature Scheme from Bilinear Pairings
ID-based public key systems allow the user to use his/her identity as the public key, which can simplify key management procedure compared with CA-based public key systems. However...
Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, ...
NDSS
2003
IEEE
15 years 5 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
CORR
2004
Springer
107views Education» more  CORR 2004»
15 years 14 days ago
A Directed Threshold - Signature Scheme
Sunder Lal, Manoj Kumar
81
Voted
CSI
2004
97views more  CSI 2004»
15 years 14 days ago
Improvement of threshold proxy signature scheme
Zuhua Shao