Abstract — In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length of the RSA signature modulus. Also, the signing process of the proposed scheme is more efficient in terms of time complexity and interaction. Keywords- Shamir secret sharing; threshold signature; random oracle model. I
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not ...
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the c...
Abstract We describe and analyze a new digital signature scheme. The new scheme is quite efficient, ...
We present an RSA threshold signature scheme. The scheme enjoys the following properties: 1. it is u...
International audienceThe aim of this article is to propose a ful ly distributed environment for the...
Abstract. The aim of this article is to propose a fully distributed environment for the RSA scheme. ...
Abstract. The aim of this article is to propose a fully distributed envi-ronment for the RSA scheme....
We present a novel implementation of the threshold RSA. Our solution is conceptually simple, and lea...
We present a novel implementation of the threshold RSA. Our solution is conceptually simple, and lea...
We propose a secure threshold signature scheme without trusted dealer. Our construction is based on ...
A multisignature scheme is developed here by combining the RSA signature scheme with Shamir's t...
[[abstract]]Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on th...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
Abstract. We discuss a modification of the Cramer-Shoup strong-RSA signature scheme. Our proposal al...
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not ...
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the c...
Abstract We describe and analyze a new digital signature scheme. The new scheme is quite efficient, ...
We present an RSA threshold signature scheme. The scheme enjoys the following properties: 1. it is u...
International audienceThe aim of this article is to propose a ful ly distributed environment for the...
Abstract. The aim of this article is to propose a fully distributed environment for the RSA scheme. ...
Abstract. The aim of this article is to propose a fully distributed envi-ronment for the RSA scheme....
We present a novel implementation of the threshold RSA. Our solution is conceptually simple, and lea...
We present a novel implementation of the threshold RSA. Our solution is conceptually simple, and lea...
We propose a secure threshold signature scheme without trusted dealer. Our construction is based on ...
A multisignature scheme is developed here by combining the RSA signature scheme with Shamir's t...
[[abstract]]Hwang, Lu and Lin (2003) proposed a (t, n) threshold proxy signature scheme, based on th...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
International audienceThe Fiat-Shamir paradigm for transforming identification schemes into signatur...
Abstract. We discuss a modification of the Cramer-Shoup strong-RSA signature scheme. Our proposal al...
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not ...
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the c...
Abstract We describe and analyze a new digital signature scheme. The new scheme is quite efficient, ...