Discrete logarithms in finite fields and their cryptographic significance
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Attacks on some RSA signatures
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Two remarks concerning the Goldwasser-Micali-Rivest signature scheme
Proceedings on Advances in cryptology---CRYPTO '86
Secret sharing homomorphisms: keeping shares of a secret secret
Proceedings on Advances in cryptology---CRYPTO '86
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Reducing elliptic curve logarithms to logarithms in a finite field
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
A signature with shared verification scheme
CRYPTO '89 Proceedings on Advances in cryptology
Secret sharing over infinite domains (extended abstract)
CRYPTO '89 Proceedings on Advances in cryptology
Digital signatures with RSA and other public-key cryptosystems
Communications of the ACM
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Information Theory and Reliable Communication
Information Theory and Reliable Communication
How to securely replicate services
ACM Transactions on Programming Languages and Systems (TOPLAS)
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Access control and signatures via quorum secret sharing
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
A k-th order Carmichael key scheme for shared encryption
ACM SIGSAC Review
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Three Systems for Threshold Generation of Authenticators
Designs, Codes and Cryptography
Unconditionally Secure Group Authentication
Designs, Codes and Cryptography
Access Control and Signatures via Quorum Secret Sharing
IEEE Transactions on Parallel and Distributed Systems
Efficient fault-tolerant certificate revocation
Proceedings of the 7th ACM conference on Computer and communications security
Efficient generation of shared RSA keys
Journal of the ACM (JACM)
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Adaptively secure distributed public-key systems
Theoretical Computer Science
An Architecture for Survivable Coordination in Large Distributed Systems
IEEE Transactions on Knowledge and Data Engineering
Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Forward-Secure Threshold Signature Schemes
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract)
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Remark on the Threshold RSA Signature Scheme
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
An Identity-Based Signature Scheme with Bounded Life-Span
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Threshold DSS Signatures without a Trusted Party
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Robust and Efficient Sharing of RSA Functions
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Weakness in Some Threshold Cryptosystems
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Authentication of Concast Communication
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Improved Methods to Perform Threshold RSA
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Fully Distributed Threshold RSA under Standard Assumptions
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Threshold Cryptosystems Based on Factoring
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Adaptively-Secure Distributed Public-Key Systems
ESA '99 Proceedings of the 7th Annual European Symposium on Algorithms
Adaptive Security for the Additive-Sharing Based Proactive RSA
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
An asynchronous protocol for distributed computation of RSA inverses and its applications
Proceedings of the twenty-second annual symposium on Principles of distributed computing
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
A systematic approach for encryption and authentication with fault tolerance
Computer Networks: The International Journal of Computer and Telecommunications Networking
CODEX: A Robust and Secure Secret Distribution System
IEEE Transactions on Dependable and Secure Computing
A threshold signature scheme for group communications without a shared distribution center
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
A convertible group signature scheme
ACM SIGOPS Operating Systems Review
Solving the invalid signer-verified signature problem and comments on Xia-You group signature
Journal of Systems and Software
Robust ID-based threshold signcryption scheme from pairings
InfoSecu '04 Proceedings of the 3rd international conference on Information security
EURASIP Journal on Wireless Communications and Networking
Optimal resilient threshold GQ signatures
Information Sciences: an International Journal
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Efficient and Adaptive Threshold Signatures for Ad hoc networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Threshold cryptography based on Asmuth-Bloom secret sharing
Information Sciences: an International Journal
Providing distributed certificate authority service in cluster-based mobile ad hoc networks
Computer Communications
Robust RSA distributed signatures for large-scale long-lived ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Partially Blind Threshold Signature Based on RSA
Informatica
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery
Computational Intelligence and Security
On Linear Secret Sharing for Connectivity in Directed Graphs
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Research on anonymous signatures and group signatures
Computer Communications
A secure identity-based threshold signature scheme from Tate pairings
ICAIT '08 Proceedings of the 2008 International Conference on Advanced Infocomm Technology
An efficient conic curve threshold digital signature
CISST'09 Proceedings of the 3rd WSEAS international conference on Circuits, systems, signal and telecommunications
Secret Sharing and Non-Shannon Information Inequalities
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Ring signature scheme for ECC-based anonymous signcryption
Computer Standards & Interfaces
A distributed E-business system based on conic curve
WSEAS Transactions on Computers
Practical Threshold Signatures with Linear Secret Sharing Schemes
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Towards compromise-resilient localized authentication architecture for wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Distributed Privilege Enforcement in PACS
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Integration of a secure mobile payment system in a GSM/UMTS SIM smart card
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Fault-tolerant authentication services
International Journal of Computers and Applications
Efficient multiplicative sharing schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Robust threshold DSS signatures
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Classification of ideal homomorphic threshold schemes over finite Abelian groups
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Securing traceability of ciphertexts: towards a secure software key escrow system
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Verifiable secret sharing as secure computation
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Weakly-private secret sharing schemes
TCC'07 Proceedings of the 4th conference on Theory of cryptography
The dark side of threshold cryptography
FC'02 Proceedings of the 6th international conference on Financial cryptography
Split-and-delegate: threshold cryptography for the masses
FC'02 Proceedings of the 6th international conference on Financial cryptography
Threshold RSA for dynamic and ad-hoc groups
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Robust threshold schemes based on the Chinese remainder theorem
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
IEEE Transactions on Wireless Communications
Crypto topics and applications I
Algorithms and theory of computation handbook
Crypto topics and applications II
Algorithms and theory of computation handbook
Breaking and building of threshold signcryption schemes
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Network trust management in emergency situations
Journal of Computer and System Sciences
Threshold and revocation cryptosystems via extractable hash proofs
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Secret-sharing schemes: a survey
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
An ideal and robust threshold RSA
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
A robust coalition-resistant threshold signature scheme with anonymous signers
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
An efficient implementation of a threshold RSA signature scheme
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Security analysis of some threshold signature schemes and multi-signature schemes
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A group-oriented (t, n) threshold signature scheme against replay attacks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A practical solution to the (t, n) threshold untraceable signature with (k, l) verification scheme
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A traitor tracing scheme based on RSA for fast decryption
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Threshold cryptography in mobile ad hoc networks
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Characterizing ideal weighted threshold secret sharing
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
On matroids and non-ideal secret sharing
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Threshold and proactive pseudo-random permutations
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Research note: Threshold signature schemes with traceable signers in group communications
Computer Communications
Research note: ID-based group-oriented cryptosystem and its digital signature scheme
Computer Communications
Research note: Group-oriented undeniable signature schemes with a trusted center
Computer Communications
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Efficient threshold zero-knowledge with applications to user-centric protocols
ICITS'12 Proceedings of the 6th international conference on Information Theoretic Security
Secure and practical threshold RSA
Proceedings of the 6th International Conference on Security of Information and Networks
Sharing DSS by the Chinese Remainder Theorem
Journal of Computational and Applied Mathematics
Hi-index | 0.00 |
Often it is desired that the power to sign or authenticate messages is shared. This paper presents methods to collectively generate RSA signatures, provably secure authenticators and unconditionally secure authenticators. In the new schemes, l individuals are given shares such that k 驴 l are needed to generate a signature (authenticator) but less than k can not. When the k people have finished signing (authenticating), nobody can perform an impersonation or substitution attack. These schemes are called threshold signature (authentication) schemes. Clearly these schemes are better than each of the k individuals sending a separate authenticator for each message or if each of the k individuals each send their share to a "trusted" person who will sign for them.In all of the schemes we assume that the shareholders (senders) and receiver have secure workstations but the network and servers are not necessarily secure.