Title: | security analysis of some threshold signature schemes and multi-signature schemes |
Author: | Cao TJ
; Lin DD
|
Source: | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
Conference Name: | 1st SKLOIS Conference on Information Security and Cryptology
|
Conference Date: | DEC 15-17,
|
Issued Date: | 2005
|
Conference Place: | Beijing, PEOPLES R CHINA
|
Keyword: | Computer crime
; Computer privacy
; Data privacy
; Security of data
|
Publisher: | INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS
|
Publish Place: | HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
|
Indexed Type: | sci
; istp
; ei
|
ISSN: | 0302-9743
|
ISBN: | 3-540-30855-5
|
Department: | China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221008, Peoples R China. Chinese Acad Sci, Inst Software, Beijing 100080, Peoples R China.
|
Sponsorship: | State Key Lab Informat Secur, Chinese Acad Sci
|
English Abstract: | Digital signature scheme allows a user to sign a message in such a way that anyone can verify the signature, but no one can forge the signature on any other message. In this paper, we show that Xie and Yus threshold signature scheme, Huang and |
Language: | 英语
|
Content Type: | 会议论文
|
URI: | http://ir.iscas.ac.cn/handle/311060/12694
|
Appears in Collections: | 软件所图书馆_会议论文
|
File Name/ File Size |
Content Type |
Version |
Access |
License |
|
security analysis of some threshold signature schemes and multi-signature schemes.pdf(318KB) | -- | -- | 限制开放 | -- | 联系获取全文 |
|
Recommended Citation: |
Cao TJ,Lin DD. security analysis of some threshold signature schemes and multi-signature schemes[C]. 见:1st SKLOIS Conference on Information Security and Cryptology. Beijing, PEOPLES R CHINA. DEC 15-17,.
|
|
|