In digital signature schemes a user is allowed to sign a document by using a public key infrastructure (PKI). For signing a document, the sender encrypts the hash of the document by using his private key. Then, the verifier uses the signer’s public key to decrypt the received signature and to check if it matches the document hash. Generally a digital signature scheme demands only one signer to sign a message so that the validity of the signature can be checked later. But under some situations a group of signers is required to sign a message cooperatively, so that a single verifier or a group of verifiers can check the validity of the given signature. This scheme is known as a multisignature. A multisignature scheme is one of the tools in whi...
The digital signature is used to ensure the integrity of messages as well as the authentication and ...
The usual sequential multi-signature scheme allows the multi-signers to sign the document with their...
In this thesis, we provide contributions to signature schemes and identi cation schemes in four di e...
A contract signature is a particular form of digital multi-signature that only involves two signers....
Multisignature scheme realizes that plural users generate the signature on a message, and that the s...
In 2004, Hwang and Chen proposed a new kind of proxy signature schemes, multi-proxy multi-signature ...
[[abstract]]In 1999, Harn proposed a multisignature scheme with distinguished signing authorities. I...
Multisignature is a variant of digital signature which enables a document to be signed by multiple s...
[[abstract]]In 1999, Ham proposed a multisignature scheme with distinguished signing authorities. In...
Multisignature scheme realizes that plural users generate the signature on a message, and that the s...
MuSig is a multi-signature scheme for Schnorr signatures, which supports key aggregation and is secu...
We describe a new Schnorr-based multi-signature scheme (i.e., a protocol which allows a group of sig...
Ordered multisignature scheme is a signature scheme to guarantee both validity of an electronic docu...
One of the important objectives of information security systems is providing authentication of the e...
As the application of digital signature is progressed in real life, the situation of using digital s...
The digital signature is used to ensure the integrity of messages as well as the authentication and ...
The usual sequential multi-signature scheme allows the multi-signers to sign the document with their...
In this thesis, we provide contributions to signature schemes and identi cation schemes in four di e...
A contract signature is a particular form of digital multi-signature that only involves two signers....
Multisignature scheme realizes that plural users generate the signature on a message, and that the s...
In 2004, Hwang and Chen proposed a new kind of proxy signature schemes, multi-proxy multi-signature ...
[[abstract]]In 1999, Harn proposed a multisignature scheme with distinguished signing authorities. I...
Multisignature is a variant of digital signature which enables a document to be signed by multiple s...
[[abstract]]In 1999, Ham proposed a multisignature scheme with distinguished signing authorities. In...
Multisignature scheme realizes that plural users generate the signature on a message, and that the s...
MuSig is a multi-signature scheme for Schnorr signatures, which supports key aggregation and is secu...
We describe a new Schnorr-based multi-signature scheme (i.e., a protocol which allows a group of sig...
Ordered multisignature scheme is a signature scheme to guarantee both validity of an electronic docu...
One of the important objectives of information security systems is providing authentication of the e...
As the application of digital signature is progressed in real life, the situation of using digital s...
The digital signature is used to ensure the integrity of messages as well as the authentication and ...
The usual sequential multi-signature scheme allows the multi-signers to sign the document with their...
In this thesis, we provide contributions to signature schemes and identi cation schemes in four di e...