Conditionally secure secret sharing schemes with disenrollment capability
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Differential-linear cryptanalysis and threshold signatures
Differential-linear cryptanalysis and threshold signatures
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Generalized Threshold Cryptosystems
ASIACRYPT '91 Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Threshold Schemes with Disenrollment
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Two-Party Generation of DSA Signatures
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Weakness in Some Threshold Cryptosystems
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Undetachable Threshold Signatures
Proceedings of the 8th IMA International Conference on Cryptography and Coding
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs
Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Threshold authenticated encryption scheme using labor-division signature
Computer Standards & Interfaces
Robust threshold DSS signatures
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Crypto topics and applications II
Algorithms and theory of computation handbook
Threshold signature schemes for ElGamal variants
Computer Standards & Interfaces
Efficient mutual authentication for multi-domain RFID systems using distributed signatures
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Hi-index | 0.00 |
A t-out-of-l threshold signature scheme allows l members of a group to own shares of a private key such that any t of them can create a signature, while fewer them t cannot. Most of these schemes require a single trusted party to create the secret key and calculate the l shares. Harn [10] and Li, Hwang, and Lee [13] have devised threshold schemes based on the difficulty of solving the discrete logarithm problem which do not require such a trusted party. This paper extends that property to 2-out-of-l threshold signatures based on the Digital Signature Standard and describes two possible generalizations to a t-out-of-l scheme.