Optimal resilient threshold GQ signatures
From MaRDI portal
Publication:881852
DOI10.1016/j.ins.2006.11.001zbMath1110.94027OpenAlexW1975926273MaRDI QIDQ881852
Wen-Guey Tzeng, Cheng-Kang Chu
Publication date: 18 May 2007
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2006.11.001
Related Items (5)
Threshold cryptography based on Asmuth-Bloom secret sharing ⋮ Non-interactive identity-based threshold signature scheme without random oracles ⋮ Certificateless threshold cryptosystem secure against chosen-ciphertext attack ⋮ New \((t, n)\) threshold directed signature scheme with provable security ⋮ A multisecret sharing scheme for color images based on cellular automata
Cites Work
- Fine-grained forward-secure signature schemes without random oracles
- How to share a function securely
- Robust Threshold DSS Signatures
- Robust and Efficient Sharing of RSA Functions
- Simplified Threshold RSA with Adaptive and Proactive Security
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Reaching Agreement in the Presence of Faults
- The Byzantine Generals Problem
- Applied Cryptography and Network Security
- Weight distributions of the cosets of the (32,6) Reed-Muller code
- Public Key Cryptography - PKC 2005
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Optimal resilient threshold GQ signatures