[[abstract]]In 1999, Harn proposed a multisignature scheme with distinguished signing authorities. In Harn’s scheme, a malice member easily confuses the signing authorities since individual signatures and multisignatures both generated on the whole document cannot be used as evidence to distinguish the signing authorities. Moreover, Harn’s scheme is also not secure against Li et al.’s attack [4]. To provide evidence and remove Li et al.’s attack, a new multisignature scheme with distinguished signing authorities is proposed in this article
[[abstract]]Due to the special requirements of the mobile code system, Shieh et al. (see IEEE Trans....
Hwang & Chen recently proposed new multi-proxy multi-signature schemes that allow a group of authori...
In this thesis, we provide contributions to signature schemes and identi cation schemes in four di e...
[[abstract]]In 1999, Ham proposed a multisignature scheme with distinguished signing authorities. In...
An insider attack on Harn's digital multisignature scheme with undistinguished signing authorities i...
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to si...
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to si...
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to si...
There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s sc...
A serious weakness is identified in the ID-based structured multisignature scheme of Lin, Wu and Hwa...
In digital signature schemes a user is allowed to sign a document by using a public key infrastructu...
[[abstract]]In this paper, we motivate the need for efficient multisignature schemes in delegated mo...
[[abstract]]In 2000, Shieh et al. proposed two novel multisignature schemes (a serial multisignature...
Multisignature scheme realizes that plural users generate the signature on a message, and that the s...
[[abstract]]Recently, Chang et al. proposed an ElGamal-like multi-signature scheme using self-certif...
[[abstract]]Due to the special requirements of the mobile code system, Shieh et al. (see IEEE Trans....
Hwang & Chen recently proposed new multi-proxy multi-signature schemes that allow a group of authori...
In this thesis, we provide contributions to signature schemes and identi cation schemes in four di e...
[[abstract]]In 1999, Ham proposed a multisignature scheme with distinguished signing authorities. In...
An insider attack on Harn's digital multisignature scheme with undistinguished signing authorities i...
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to si...
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to si...
A multisignature scheme for specified group of verifiers needs a group of signers’ cooperation to si...
There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s sc...
A serious weakness is identified in the ID-based structured multisignature scheme of Lin, Wu and Hwa...
In digital signature schemes a user is allowed to sign a document by using a public key infrastructu...
[[abstract]]In this paper, we motivate the need for efficient multisignature schemes in delegated mo...
[[abstract]]In 2000, Shieh et al. proposed two novel multisignature schemes (a serial multisignature...
Multisignature scheme realizes that plural users generate the signature on a message, and that the s...
[[abstract]]Recently, Chang et al. proposed an ElGamal-like multi-signature scheme using self-certif...
[[abstract]]Due to the special requirements of the mobile code system, Shieh et al. (see IEEE Trans....
Hwang & Chen recently proposed new multi-proxy multi-signature schemes that allow a group of authori...
In this thesis, we provide contributions to signature schemes and identi cation schemes in four di e...