This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users
In this thesis, four different methods for secret sharing with threshold schemes will be investigate...
[[abstract]]A threshold signature, first proposed by Desmedt and Frankel, allows or more members...
The power of sharing computation in a cryptosystem is crucial in several real-life applications of c...
Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4]. ...
Abstract—Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k, l) ...
Abstract—In this paper, we present a signcryption scheme based on elliptic curve cryptosystem, which...
The paper presents the systematization of existing schemes of blind signatures. The analysis of diff...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
Abstract: The problem called “constructing signature schemes for specified verifiers ” is proposed b...
The study presents a threshold signature scheme. While developing threshold cryptography, the concep...
Abstract—In this paper, a (t; n) threshold signature scheme is constructed without a trusted party, ...
. While in the ordinary digital signature model one verifier is sufficient to check the validity of ...
Abstract—A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an...
Abstract. In the (t; n) proxy signature scheme, the signature, originally signed by a signer, can be...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
In this thesis, four different methods for secret sharing with threshold schemes will be investigate...
[[abstract]]A threshold signature, first proposed by Desmedt and Frankel, allows or more members...
The power of sharing computation in a cryptosystem is crucial in several real-life applications of c...
Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4]. ...
Abstract—Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k, l) ...
Abstract—In this paper, we present a signcryption scheme based on elliptic curve cryptosystem, which...
The paper presents the systematization of existing schemes of blind signatures. The analysis of diff...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
Abstract: The problem called “constructing signature schemes for specified verifiers ” is proposed b...
The study presents a threshold signature scheme. While developing threshold cryptography, the concep...
Abstract—In this paper, a (t; n) threshold signature scheme is constructed without a trusted party, ...
. While in the ordinary digital signature model one verifier is sufficient to check the validity of ...
Abstract—A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an...
Abstract. In the (t; n) proxy signature scheme, the signature, originally signed by a signer, can be...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
In this thesis, four different methods for secret sharing with threshold schemes will be investigate...
[[abstract]]A threshold signature, first proposed by Desmedt and Frankel, allows or more members...
The power of sharing computation in a cryptosystem is crucial in several real-life applications of c...