Threshold and multi-signature schemes from linear hash functions
From MaRDI portal
Publication:6083683
DOI10.1007/978-3-031-30589-4_22zbMath1528.94102OpenAlexW4365935020MaRDI QIDQ6083683
Publication date: 8 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-30589-4_22
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- FROST: Flexible round-optimized Schnorr threshold signatures
- Another look at ``provable security
- Secure distributed key generation for discrete-log based cryptosystems
- The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
- The algebraic group model and its applications
- Lattice-based blind signatures, revisited
- MuSig2: simple two-round Schnorr multi-signatures
- A modular treatment of blind signatures from identification schemes
- How to share a function securely
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security
- How to share a secret
- Robust and Efficient Sharing of RSA Functions
- New scheme for digital multisignatures
- Identity-Based Aggregate and Multi-Signature Schemes Based on RSA
- Simplified Threshold RSA with Adaptive and Proactive Security
- Another look at non-standard discrete log and Diffie-Hellman problems
- A digital multisignature scheme using bijective public-key cryptosystems
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Identity-Based Multi-signatures from RSA
- Threshold RSA for Dynamic and Ad-Hoc Groups
- On the (in)security of ROS
- Chain Reductions for Multi-signatures and the HBMS Scheme
- Better than advertised security for non-interactive threshold signatures
This page was built for publication: Threshold and multi-signature schemes from linear hash functions