Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJuly 2024
Threshold Ring Signatures with Accountability
AbstractThreshold ring signatures (TRS) allow several signers to sign the same message on behalf of a group. This scheme is fully anonymity in that a signature reveals the number of signers who created the signature but tells nothing about the identity of ...
- research-articleMay 2013
Multi-key leakage-resilient threshold cryptography
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications securityPages 61–70https://doi.org/10.1145/2484313.2484321With the goal of ensuring availability of security services such as encryption and authentication, we initiate the study of leakage-resilient threshold cryptography, for achieving formal security guarantee under various key-exposure attacks. A ...
- research-articleMarch 2011
Threshold ring signature without random oracles
ASIACCS '11: Proceedings of the 6th ACM Symposium on Information, Computer and Communications SecurityPages 261–267https://doi.org/10.1145/1966913.1966947In this paper, we present the notion and construction of threshold ring signature without random oracles. This is the first scheme in the literature that is proven secure in the standard model. Our scheme extends the Shacham-Waters signature from PKC ...