[[abstract]]Recently, Chang et al. proposed an ElGamal-like multi-signature scheme using self-certified public keys. Being inspired of the insider attack, an insider attack is proposed on their scheme to show that a malicious member in the signing group can forge a valid multi-signature without the other members secrete keys. To remove this attack, an improved multi-signature is also proposed.[[sponsorship]]教育部; 國家科學委員會; 東華大學[[notice]]補正完畢[[conferencetype]]國際[[conferencedate]]20021218~20021221[[booktype]]紙本[[iscallforpapers]]Y[[conferencelocation]]花蓮縣, 臺
As the application of digital signature is progressed in real life, the situation of using digital s...
Abstract. Multiparty signature protocols need protection against rogue-key attacks, made possible wh...
Hwang & Chen recently proposed new multi-proxy multi-signature schemes that allow a group of authori...
There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s sc...
[[abstract]]The proxy multi-signature is a very useful tool, which allows multiple signers to genera...
The public-key infrastructure will be utilized to store and disseminate certified copies of user’s p...
Abstract—Signature schemes with message recovery based on self-certified public keys can reduce the ...
[[abstract]]A new kind of proxy signature schemes is first proposed: multi-proxy multi-signature sch...
[[abstract]]A group signature is a digital signature that allows a group member to sign messages ano...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
[[abstract]]Recently, Yen and Joye showed that Harn and Lin's authenticated multiple-key agreement p...
. We present a new method to forge ElGamal signatures if the public parameters of the system are not...
[[abstract]]Recently, Hwang and Chen [5] proposed a variation of proxy signature scheme called the m...
[[abstract]]Lyuu and Wu proposed a new insider attack to forge multi-proxy multi-signature in Hwang-...
[[abstract]]In 1999, Ham proposed a multisignature scheme with distinguished signing authorities. In...
As the application of digital signature is progressed in real life, the situation of using digital s...
Abstract. Multiparty signature protocols need protection against rogue-key attacks, made possible wh...
Hwang & Chen recently proposed new multi-proxy multi-signature schemes that allow a group of authori...
There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s sc...
[[abstract]]The proxy multi-signature is a very useful tool, which allows multiple signers to genera...
The public-key infrastructure will be utilized to store and disseminate certified copies of user’s p...
Abstract—Signature schemes with message recovery based on self-certified public keys can reduce the ...
[[abstract]]A new kind of proxy signature schemes is first proposed: multi-proxy multi-signature sch...
[[abstract]]A group signature is a digital signature that allows a group member to sign messages ano...
Abstract. A (t, n) threshold proxy signature scheme enables an original signer to delegate his/her s...
[[abstract]]Recently, Yen and Joye showed that Harn and Lin's authenticated multiple-key agreement p...
. We present a new method to forge ElGamal signatures if the public parameters of the system are not...
[[abstract]]Recently, Hwang and Chen [5] proposed a variation of proxy signature scheme called the m...
[[abstract]]Lyuu and Wu proposed a new insider attack to forge multi-proxy multi-signature in Hwang-...
[[abstract]]In 1999, Ham proposed a multisignature scheme with distinguished signing authorities. In...
As the application of digital signature is progressed in real life, the situation of using digital s...
Abstract. Multiparty signature protocols need protection against rogue-key attacks, made possible wh...
Hwang & Chen recently proposed new multi-proxy multi-signature schemes that allow a group of authori...