A database encryption system with subkeys
ACM Transactions on Database Systems (TODS)
Communications of the ACM
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Riemann's hypothesis and tests for primality
Journal of Computer and System Sciences
Hi-index | 0.00 |
Shared generation of secure signatures, called the threshold signatures, was introduced by Desmedt and Frankel in 1991. A threshold signature scheme is not only a threshold scheme, but also a signature scheme. Therefore, it should possess the properties of both threshold scheme and digital signature scheme. In this paper, we investigate conspiracy attacks on the Desmedt and Frankel's threshold RSA signature scheme. We also discuss the requirements of secure threshold signature scheme.