[[abstract]]A threshold signature, first proposed by Desmedt and Frankel, allows or more members of the group cooperate to generate a signature on behalf of the group while providing the anonymity of the signers. Unfortunately, all threshold signature schemes proposed so far can not withstand the conspiracy attack, thus the group secret key can be revealed. In this paper, we propose a new threshold signature scheme to avoid the conspiracy attack. The security of the proposed threshold signature scheme is based on the difficulty of computing the discrete logarithm modulo for a composite number. The size of the group signature and the verification time of the group signature are equivalent to that of an individual signature
[[abstract]]Group signature has been proposed for many years, those schemes are still not efficient....
[[abstract]]The concept of universal modulus, meaning that the modulus used by each authorized membe...
[[abstract]]In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature ...
The study presents a threshold signature scheme. While developing threshold cryptography, the concep...
[[abstract]]In 1998, Wang et al. proposed two new (t,n)-threshold signature schemes with traceable s...
[[abstract]]In 2000, Wang et al. proposed a new (t, n) threshold signature scheme with (k, l) thresh...
[[abstract]]Group signatures, first introduced by Chaum and Heyst at Eurocrypt'91, allow individual ...
In 2003, Wang et al.[1] proposed a (t, n) threshold signature scheme without a trusted party based o...
We introduce in this paper a new identity-based threshold signature (IBTHS) technique, which is base...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
. Group signatures, introduced by Chaum and van Heijst, allow members of a group to sign messages an...
AbstractHua-wang Qin et al. proposed a novel threshold signature scheme based on the general access ...
A forgery attack on the group-oriented (t,n) threshold signature schemes was described. The scheme c...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
[[abstract]]Group signature has been proposed for many years, those schemes are still not efficient....
[[abstract]]The concept of universal modulus, meaning that the modulus used by each authorized membe...
[[abstract]]In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature ...
The study presents a threshold signature scheme. While developing threshold cryptography, the concep...
[[abstract]]In 1998, Wang et al. proposed two new (t,n)-threshold signature schemes with traceable s...
[[abstract]]In 2000, Wang et al. proposed a new (t, n) threshold signature scheme with (k, l) thresh...
[[abstract]]Group signatures, first introduced by Chaum and Heyst at Eurocrypt'91, allow individual ...
In 2003, Wang et al.[1] proposed a (t, n) threshold signature scheme without a trusted party based o...
We introduce in this paper a new identity-based threshold signature (IBTHS) technique, which is base...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
. Group signatures, introduced by Chaum and van Heijst, allow members of a group to sign messages an...
AbstractHua-wang Qin et al. proposed a novel threshold signature scheme based on the general access ...
A forgery attack on the group-oriented (t,n) threshold signature schemes was described. The scheme c...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
Group signatures make it possible for group members to sign messages on behalf of the group, while n...
[[abstract]]Group signature has been proposed for many years, those schemes are still not efficient....
[[abstract]]The concept of universal modulus, meaning that the modulus used by each authorized membe...
[[abstract]]In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature ...