1994
DOI: 10.1049/ip-cdt:19941293
|View full text |Cite
|
Sign up to set email alerts
|

Group-oriented (t, n) threshold digital signature scheme and digital multisignature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
119
0
1

Year Published

2001
2001
2020
2020

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 239 publications
(120 citation statements)
references
References 0 publications
0
119
0
1
Order By: Relevance
“…In a threshold signature scheme [19], when there are t or more than t group members, a group signature can be generated successfully. The group signature can be verified by any verifier using the group public key.…”
Section: Gf Pmentioning
confidence: 99%
See 1 more Smart Citation
“…In a threshold signature scheme [19], when there are t or more than t group members, a group signature can be generated successfully. The group signature can be verified by any verifier using the group public key.…”
Section: Gf Pmentioning
confidence: 99%
“…When there are t or more than t group members, the group cipher-text can be decrypted successfully. All existing threshold cryptographic algorithms [19][20][21][22][23][24][25][26] only consider the situation when all participating users are legitimate group members. In this paper, we point out that when there are more than t participating users and computed valued are released asynchronously in a threshold application, an attacker can obtain the valid output of the application and therefore, can impersonate to be a legitimate group member without being detected.…”
Section: Gf Pmentioning
confidence: 99%
“…For example, threshold cryptography, first introduced by Desmedt [5], is the application of secret-sharing with public-key algorithms. Among various threshold cryptosystems, some are based on ElGamal [6,7], some are based on RSA [8][9][10][11], some are based on Elliptic Curves [12,13], and some are based on Pairing [14]. In these protocols, shares are either used to generate a digital signature or used to decrypt a ciphertext.…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…Early work in the field is due to Boyd [7], Desmedt [19], Croft and Harris [17], Frankel [24], and Desmedt and Frankel [20]. Work in threshold cryptography for discrete-log based cryptosystems includes, for example, Desmedt and Frankel [20], Hwang [32], Pedersen [40], Cerecedo et al [12], Harn [30], Langford [34], Gennaro et al [29], Park and Kurosawa [39], Herzberg et al [31], and Frankel et al [26].…”
Section: Related Workmentioning
confidence: 99%