[[abstract]]In 1999, Ham proposed a multisignature scheme with distinguished signing authorities. In Ham's scheme, a malice member easily confuses the signing authorities since individual signatures and multisignatures both generated on the whole document cannot be used as evidence to distinguish the signing authorities. Moreover, Ham' scheme is also not secure against Li et al.'s attack [4]. To provide evidence and remove Li et al.'s attack, a new multisignature scheme with distinguished signing authorities is proposed in this article.[[notice]]補正完畢[[journaltype]]國內[[incitationindex]]SCI[[incitationindex]]E
Multisignature scheme realizes that plural users generate the signature on a message, and that the s...
In this paper, we propose a multi-signature scheme, in which each signer can express her intention a...
In this thesis, we provide contributions to signature schemes and identi cation schemes in four di e...
[[abstract]]In 1999, Harn proposed a multisignature scheme with distinguished signing authorities. I...
An insider attack on Harn's digital multisignature scheme with undistinguished signing authorities i...
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to si...
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to si...
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to si...
There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s sc...
[[abstract]]In this paper, we motivate the need for efficient multisignature schemes in delegated mo...
A serious weakness is identified in the ID-based structured multisignature scheme of Lin, Wu and Hwa...
In digital signature schemes a user is allowed to sign a document by using a public key infrastructu...
[[abstract]]Due to the special requirements of the mobile code system, Shieh et al. (see IEEE Trans....
[[abstract]]Recently, Chang et al. proposed an ElGamal-like multi-signature scheme using self-certif...
[[abstract]]In 2000, Shieh et al. proposed two novel multisignature schemes (a serial multisignature...
Multisignature scheme realizes that plural users generate the signature on a message, and that the s...
In this paper, we propose a multi-signature scheme, in which each signer can express her intention a...
In this thesis, we provide contributions to signature schemes and identi cation schemes in four di e...
[[abstract]]In 1999, Harn proposed a multisignature scheme with distinguished signing authorities. I...
An insider attack on Harn's digital multisignature scheme with undistinguished signing authorities i...
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to si...
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to si...
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to si...
There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s sc...
[[abstract]]In this paper, we motivate the need for efficient multisignature schemes in delegated mo...
A serious weakness is identified in the ID-based structured multisignature scheme of Lin, Wu and Hwa...
In digital signature schemes a user is allowed to sign a document by using a public key infrastructu...
[[abstract]]Due to the special requirements of the mobile code system, Shieh et al. (see IEEE Trans....
[[abstract]]Recently, Chang et al. proposed an ElGamal-like multi-signature scheme using self-certif...
[[abstract]]In 2000, Shieh et al. proposed two novel multisignature schemes (a serial multisignature...
Multisignature scheme realizes that plural users generate the signature on a message, and that the s...
In this paper, we propose a multi-signature scheme, in which each signer can express her intention a...
In this thesis, we provide contributions to signature schemes and identi cation schemes in four di e...