Sciweavers

795 search results - page 6 / 159
» On the value of threshold signatures
Sort
View
WISA
2005
Springer
15 years 3 months ago
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes
Abstract. A proxy signature scheme allows an entity to delegate its signing power to another entity. Since the notion of proxy signatures was first introduced, many proxy signatur...
Je Hong Park, Bo Gyeong Kang, Sangwoo Park
ASIACRYPT
2001
Springer
15 years 2 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
CTRSA
2009
Springer
112views Cryptology» more  CTRSA 2009»
15 years 1 months ago
Divisible On-Line/Off-Line Signatures
On-line/Off-line signatures are used in a particular scenario where the signer must respond quickly once the message to be signed is presented. The idea is to split the signing pro...
Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming...
RSA
2006
62views more  RSA 2006»
14 years 9 months ago
Threshold values of random K-SAT from the cavity method
: Using the cavity equations of M
Stephan Mertens, Marc Mézard, Riccardo Zecc...
CTRSA
2001
Springer
120views Cryptology» more  CTRSA 2001»
15 years 2 months ago
Forward-Secure Threshold Signature Schemes
We consider the usage of forward security with threshold signature schemes. This means that even if more than the threshold number of players are compromised, some security remain...
Michel Abdalla, Sara K. Miner, Chanathip Namprempr...