메뉴 건너뛰기




Volumn 20, Issue 6 SPEC. ISS., 2004, Pages 1013-1021

A threshold signature scheme for group communications without a shared distribution center

Author keywords

Cryptosystem; Digital signatures; Elliptic curves; Secret sharing; Threshold cryptosystem

Indexed keywords

COMPUTATIONAL COMPLEXITY; INTERPOLATION; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SMART CARDS;

EID: 3142722021     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2003.09.005     Document Type: Conference Paper
Times cited : (55)

References (27)
  • 1
    • 0030192262 scopus 로고    scopus 로고
    • Parallel computation of the generating keys for RSA cryptosystems
    • Chang C.-C., Hwang M.-S., Parallel computation of the generating keys for RSA cryptosystems. IEE Electr. Lett. 32(15):1996;1365-1366.
    • (1996) IEE Electr. Lett. , vol.32 , Issue.15 , pp. 1365-1366
    • Chang, C.-C.1    Hwang, M.-S.2
  • 3
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal T., A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory. IT-31:1985;469-472.
    • (1985) IEEE Trans. Inform. Theory , vol.IT-31 , pp. 469-472
    • Elgamal, T.1
  • 4
    • 0023538330 scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • P. Feldman, A practical scheme for non-interactive verifiable secret sharing, in: Proceedings of the 28th IEEE Symposium on FOCS, 1987, pp. 427-437.
    • (1987) Proceedings of the 28th IEEE Symposium on FOCS , pp. 427-437
    • Feldman, P.1
  • 5
    • 0028508211 scopus 로고
    • Group-oriented (t,n) threshold signature and digital multisignature
    • L. Harn, Group-oriented (t,n) threshold signature and digital multisignature, in: IEE Proceedings on Computers and Digital Techniques, vol. 141, No. 5, 1994, pp. 307-313.
    • (1994) IEE Proceedings on Computers and Digital Techniques , vol.141 , Issue.5 , pp. 307-313
    • Harn, L.1
  • 6
    • 0029637862 scopus 로고
    • Comment: Digital signature with (t,n) shared verification based on discrete logarithms
    • Hoster P., Michels M., Peterson H., Comment: digital signature with. (t,n) shared verification based on discrete logarithms IEE Electr. Lett. 31(14):1995;1137.
    • (1995) IEE Electr. Lett. , vol.31 , Issue.14 , pp. 1137
    • Hoster, P.1    Michels, M.2    Peterson, H.3
  • 7
    • 0037116468 scopus 로고    scopus 로고
    • Improvements of threshold signature and authenticated encryption for group communications
    • Hsu C.-L., Wu T.-S., Wu T.-C., Improvements of threshold signature and authenticated encryption for group communications. Inform. Process. Lett. 81(1):2002;41-45.
    • (2002) Inform. Process. Lett. , vol.81 , Issue.1 , pp. 41-45
    • Hsu, C.-L.1    Wu, T.-S.2    Wu, T.-C.3
  • 10
    • 0034317142 scopus 로고    scopus 로고
    • (t,n) threshold untraceable signatures
    • Lee N.-Y., Hwang T., Li C.-M. (t,n) threshold untraceable signatures J. Inform. Sci. Eng. 16(6):2000;835-845.
    • (2000) J. Inform. Sci. Eng. , vol.16 , Issue.6 , pp. 835-845
    • Lee, N.-Y.1    Hwang, T.2    Li, C.-M.3
  • 11
    • 0029375592 scopus 로고
    • Comment: Digital signature with (t,n) shared verifications based on discrete logarithms
    • Lee W.B., Chang C.C., Comment: digital signature with. (t,n) shared verifications based on discrete logarithms IEE Electr. Lett. 31(19):1995;1656-1657.
    • (1995) IEE Electr. Lett. , vol.31 , Issue.19 , pp. 1656-1657
    • Lee, W.B.1    Chang, C.C.2
  • 12
    • 0035980873 scopus 로고    scopus 로고
    • Security of Wang et al.'s group-oriented (t,n) threshold signature schemes with traceable signers
    • Li Z.C., Hui L.C.K., Chow K.P., Chong C.F., Tsang W.W., Chan H.W., Security of Wang et al.'s group-oriented. (t,n) threshold signature schemes with traceable signers Inform. Process. Lett. 80(6):2001;295-298.
    • (2001) Inform. Process. Lett. , vol.80 , Issue.6 , pp. 295-298
    • Li, Z.C.1    Hui, L.C.K.2    Chow, K.P.3    Chong, C.F.4    Tsang, W.W.5    Chan, H.W.6
  • 13
    • 0035120028 scopus 로고    scopus 로고
    • A threshold digital signature scheme for a smart card based system
    • Miyazaki K., Takaragi K., A threshold digital signature scheme for a smart card based system. IEICE Trans. Fund. E84-A(1):2001;205-213.
    • (2001) IEICE Trans. Fund. , vol.E84-A , Issue.1 , pp. 205-213
    • Miyazaki, K.1    Takaragi, K.2
  • 14
    • 84936033986 scopus 로고
    • The digital signature standard proposed by Nist
    • National Institute of Standards and Technology (NIST), The digital signature standard proposed by NIST, Commun. ACM 35 (7) (1992) 36-40.
    • (1992) Commun. ACM , vol.35 , Issue.7 , pp. 36-40
  • 16
    • 0029769836 scopus 로고    scopus 로고
    • New ElGamal type threshold digital signature scheme
    • Park C., Kurosawa K., New ElGamal type threshold digital signature scheme. IEICE Trans. Fund. E79-A(1):1996;86-93.
    • (1996) IEICE Trans. Fund. , vol.E79-A , Issue.1 , pp. 86-93
    • Park, C.1    Kurosawa, K.2
  • 19
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest R.L., Shamir A., Adleman L., A method for obtaining digital signatures and public key cryptosystems. Commun. ACM. 21:1978;120-126.
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 21
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A., How to share a secret. Commun. ACM. 22:1979;612-613.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 23
    • 0002644727 scopus 로고    scopus 로고
    • Attacks on threshold signature schemes with traceable signers
    • Tseng Y.-M., Jan J.-K., Attacks on threshold signature schemes with traceable signers. Inform. Process. Lett. 71(1):1999;1-4.
    • (1999) Inform. Process. Lett. , vol.71 , Issue.1 , pp. 1-4
    • Tseng, Y.-M.1    Jan, J.-K.2
  • 24
    • 0035483324 scopus 로고    scopus 로고
    • On the security of generalization of threshold signature and authenticated encryption
    • Tseng Y.-M., Jan J.-K., Chien H.-Y., On the security of generalization of threshold signature and authenticated encryption. IEICE Trans. Fund. E84-A(10):2001;2606-2609.
    • (2001) IEICE Trans. Fund. , vol.E84-A , Issue.10 , pp. 2606-2609
    • Tseng, Y.-M.1    Jan, J.-K.2    Chien, H.-Y.3
  • 25
    • 0034205939 scopus 로고    scopus 로고
    • Generalization of threshold signature and authenticated encryption for group communications
    • Wang C.-T., Chang C.-C., Lin C.-H., Generalization of threshold signature and authenticated encryption for group communications. IEICE Trans. Fund. E83-A(6):2000;1228-1237.
    • (2000) IEICE Trans. Fund. , vol.E83-A , Issue.6 , pp. 1228-1237
    • Wang, C.-T.1    Chang, C.-C.2    Lin, C.-H.3
  • 26
    • 0032098148 scopus 로고    scopus 로고
    • Research note threshold signature schemes with traceable signers in group communications
    • Wang C.-T., Lin C.-H., Chang C.-C., Research note threshold signature schemes with traceable signers in group communications. Comput. Commun. 21(8):1998;771-776.
    • (1998) Comput. Commun. , vol.21 , Issue.8 , pp. 771-776
    • Wang, C.-T.1    Lin, C.-H.2    Chang, C.-C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.