Sciweavers

563 search results - page 18 / 113
» Verifiable Signature Sharing
Sort
View
ISCI
2010
79views more  ISCI 2010»
14 years 10 months ago
Strong (n, t, n) verifiable secret sharing scheme
Lein Harn, Changlu Lin
ISCI
2010
184views more  ISCI 2010»
14 years 9 months ago
A verifiable multi-secret sharing scheme based on cellular automata
Z. Eslami, J. Zarepour Ahmadabadi
ISW
2004
Springer
15 years 5 months ago
Chameleon Hashing Without Key Exposure
Abstract. Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon s...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
ASIACRYPT
2010
Springer
14 years 9 months ago
Constant-Size Commitments to Polynomials and Their Applications
We introduce and formally define polynomial commitment schemes, and provide two efficient constructions. A polynomial commitment scheme allows a committer to commit to a polynomial...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
COMPSEC
2004
99views more  COMPSEC 2004»
14 years 11 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...