A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
CMS '99 Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security
Dynamic threshold and cheater resistance for shamir secret sharing scheme
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
An efficient implementation of a threshold RSA signature scheme
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Hi-index | 0.00 |
The manner in which a legislature votes is similar to a threshold signature scheme, and the power to sign legislation is similar to possessing shares to sign. The threshold k denotes the quorum number, the minimum number of legislators required to be present in order for legislature to be passed. Here we discuss techniques to ensure a secure electronic legislature.