ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme
Lecture Notes in Computer Science - Information Security and Cryptology — ICISC 2002
◽
10.1007/3-540-36552-4_6
◽
2003
◽
pp. 75-89
◽
Cited By ~ 2
Author(s):
Guilin Wang
Keyword(s):
Group Signature
◽
Signature Scheme
◽
Threshold Group Signature
Download Full-text
Related Documents
Cited By
References
Cryptanalysis and improvement of a (t, n) threshold group signature scheme
Quantum Information Processing
◽
10.1007/s11128-021-03390-9
◽
2022
◽
Vol 21
(1)
◽
Author(s):
Ren Guo
◽
Xiaogang Cheng
Keyword(s):
Group Signature
◽
Signature Scheme
◽
Threshold Group Signature
Download Full-text
Threshold Group Signature Scheme with Privilege Subjects Based on ECC
2010 International Conference on Communications and Intelligence Information Security
◽
10.1109/icciis.2010.64
◽
2010
◽
Cited By ~ 1
Author(s):
Xueming Wang
◽
Yurong Dong
Keyword(s):
Group Signature
◽
Signature Scheme
◽
Threshold Group Signature
Download Full-text
A (t,n)-Threshold Group Signature Scheme Based on Compartmented Secret Sharing
2010 International Conference on Web Information Systems and Mining
◽
10.1109/wism.2010.72
◽
2010
◽
Author(s):
Tianqin Wang
Keyword(s):
Secret Sharing
◽
Group Signature
◽
Signature Scheme
◽
Threshold Group Signature
Download Full-text
A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)
◽
10.1109/snpd.2007.471
◽
2007
◽
Cited By ~ 2
Author(s):
Fengyin Li
◽
Jiguo Yu
◽
Hongwei Ju
Keyword(s):
Discrete Logarithm
◽
Discrete Logarithm Problem
◽
Group Signature
◽
Signature Scheme
◽
Threshold Group Signature
Download Full-text
A Secure and Efficient Threshold Group Signature Scheme
Applied Mechanics, Mechatronics and Intelligent Systems
◽
10.1142/9789814733878_0078
◽
2015
◽
Author(s):
Yansheng Zhang
◽
Xueming Wang
◽
Gege Qiu
Keyword(s):
Group Signature
◽
Signature Scheme
◽
Threshold Group Signature
Download Full-text
An ID-based (k, t, n) Threshold Group Signature Scheme
2011 Seventh International Conference on Computational Intelligence and Security
◽
10.1109/cis.2011.198
◽
2011
◽
Author(s):
Wei Fu
◽
Guang-liang Liu
Keyword(s):
Group Signature
◽
Signature Scheme
◽
Threshold Group Signature
Download Full-text
"Discrete Logarithm based 't, n' Threshold Group Signature Scheme"
International Journal of Computer Applications
◽
10.5120/2483-3343
◽
2011
◽
Vol 21
(2)
◽
pp. 23-27
◽
Cited By ~ 1
Author(s):
Ganesh Mante
◽
S.D. Joshi
Keyword(s):
Discrete Logarithm
◽
Group Signature
◽
Signature Scheme
◽
Threshold Group Signature
Download Full-text
A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority
Advances in Intelligent Systems and Computing - Information Systems Design and Intelligent Applications
◽
10.1007/978-981-10-7512-4_7
◽
2018
◽
pp. 64-72
◽
Cited By ~ 1
Author(s):
Dao Tuan Hung
◽
Nguyen Hieu Minh
◽
Nguyen Nam Hai
Keyword(s):
Group Signature
◽
Signature Scheme
◽
Threshold Group Signature
Download Full-text
An efficient threshold group signature scheme
Applied Mathematics and Computation
◽
10.1016/j.amc.2004.06.089
◽
2005
◽
Vol 167
(1)
◽
pp. 362-371
◽
Cited By ~ 7
Author(s):
Yuan-Lung Yu
◽
Tzer-Shyong Chen
Keyword(s):
Group Signature
◽
Signature Scheme
◽
Threshold Group Signature
Download Full-text
Multivariate threshold group signature scheme withstanding conspiracy attack
2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment
◽
10.1109/icade.2012.6330110
◽
2012
◽
Author(s):
Yu Tao
◽
Yatao Yang
◽
Zichen Li
◽
Xin Zheng
Keyword(s):
Group Signature
◽
Signature Scheme
◽
Conspiracy Attack
◽
Threshold Group Signature
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close