PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Multi-threshold signature

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The work presents a new signature scheme, called the multi-threshold signature, which generalizes the concept of multisignature and threshold signature. This scheme protects the anonymity of signers in a way the group signature does - in exceptional circumstances the identities of signers may be revealed. Due to the new party - completer, in our scheme the threshold size may vary together with the message to be signed. The presented scheme is based on the RSA signature standard, however other signature standards might be applied to it as well.
Rocznik
Tom
Strony
51--55
Opis fizyczny
Bibliogr. 10 poz.
Twórcy
autor
autor
Bibliografia
  • [1] C. Boyd, “Digital mutisignatures”, in Cryptography and Coding, H. Baker and F. Piper, Eds. Oxford: Oxford University Press, 1989.
  • [2] C. C. Chang and H. F. Huang, “An efficient and practical (t,n) threshold signature scheme with known signers”, Fundam. Informat., vol. 53, no. 3, pp. 243–253, 2003.
  • [3] Y. Desmedt and Y. Frankel, “Threshold cryptosystems”, in Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, LNCS. Berlin: Springer, 1989, vol. 435, pp. 307–319.
  • [4] K. Itakura and K. Nakamura, “A public key cryptosystem suitable for digital multisignatures”, NEC Res. Develop., no. 71, pp. 1–8, 1983.
  • [5] S. Micali, K. Ohta, and L. Reyzin, “Accountable – subgroup multisignatures”, in Proc. 8th ACM Conf. Comput. Commun. Secur. CCS’01, Philadelphia, USA, 2001.
  • [6] T. Okamoto, “A digital multisignature scheme using bijective publickey cryptosystems”, ACM Trans. Comput. Syst., vol. 6, iss. 4, pp. 432–441, 1988.
  • [7] R. L. Rivest, A. Shamir, and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.
  • [8] A. Shamir, “How to share a secret”, Commun. ACM, vol. 22, pp. 612–613, 1979.
  • [9] V. Shoup, “Practical threshold signatures”, in Proc. Adv. Cryptol. EuroCrypt 2000, Bruges, Belgium, 2000.
  • [10] J. Pomykała and T. Warchoł, “Threshold signatures in dynamic groups”, in Proc. Fut. Gener. Commun. Netw., Jeju-Island, Korea, 2007.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT8-0010-0031
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.