Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Professional Java Security
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Simplified Approach to Threshold and Proactive RSA
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Threshold Proxy Signature Schemes
ISW '97 Proceedings of the First International Workshop on Information Security
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Journal of Cryptology
Robust threshold DSS signatures
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Two efficient and provably secure schemes for server-assisted threshold signatures
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
MobiPass: a passport for mobile business
Personal and Ubiquitous Computing
Hi-index | 0.00 |
In this paper, we introduce a new model which allows an organization to perform secure admission control for foreign users. We adopt a threshold proxy signature scheme to provide precise admission control for the proposed model. Additionally, we propose a new (t,n) threshold proxy signature scheme for realistic implementation of the proposed model.