Sciweavers

795 search results - page 5 / 159
» On the value of threshold signatures
Sort
View
ICISC
2004
146views Cryptology» more  ICISC 2004»
14 years 11 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
INFORMATICALT
2007
122views more  INFORMATICALT 2007»
14 years 9 months ago
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys
In 2004, Abe et al. proposed a threshold signer-ambiguous signature scheme from variety of keys. Their scheme is a generalized case of the ring signature scheme, and it allows the ...
Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin
EUROCRYPT
2006
Springer
15 years 1 months ago
Simplified Threshold RSA with Adaptive and Proactive Security
We present the currently simplest, most efficient, optimally resilient, adaptively secure, and proactive threshold RSA scheme. A main technical contribution is a new rewinding stra...
Jesús F. Almansa, Ivan Damgård, Jespe...
ISW
1997
Springer
15 years 1 months ago
Threshold Proxy Signature Schemes
This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshol...
Kan Zhang
ITC
2000
IEEE
68views Hardware» more  ITC 2000»
15 years 1 months ago
Current ratios: a self-scaling technique for production IDDQ testing
The use of a single pass/fail threshold for IDDQ testing is unworkable as chip background currents increase to the point where they exceed many defect currents. This paper describ...
Peter C. Maxwell, Pete O'Neill, Robert C. Aitken, ...