scholarly journals Broadcast Enforced Threshold Schemes with Disenrollment

Author(s):  
Mingyan Li ◽  
Radha Poovendran
Keyword(s):  
2014 ◽  
Vol 2014 ◽  
pp. 1-13
Author(s):  
Raman Kumar ◽  
Nonika Singla

Many of the signature schemes are proposed in which thetout ofnthreshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.


Author(s):  
S. G. Barwick ◽  
W. -A. Jackson ◽  
Keith M. Martin ◽  
Peter R. Wild
Keyword(s):  

1990 ◽  
Vol 11 (1) ◽  
pp. 153-160
Author(s):  
Luigia Berardi ◽  
Mario Di Fonso ◽  
Franco Eugeni

2019 ◽  
Author(s):  
Luís T. A. N. Brandão ◽  
Michael Davidson ◽  
Apostol Vassilev

Author(s):  
Wen-Ai Jackson ◽  
Keith M. Martin ◽  
Christine M. O’Keefe
Keyword(s):  

2020 ◽  
Vol 10 (7) ◽  
pp. 2411
Author(s):  
Yijun Wang ◽  
Bing Jia ◽  
Yun Mao ◽  
Xuelin Wu ◽  
Ying Guo

Quantum secret sharing (QSS) can usually realize unconditional security with entanglement of quantum systems. While the usual security proof has been established in theoretics, how to defend against the tolerable channel loss in practices is still a challenge. The traditional ( t , n ) threshold schemes are equipped in situation where all participants have equal ability to handle the secret. Here we propose an improved ( t , n ) threshold continuous variable (CV) QSS scheme using weak coherent states transmitting in a chaining channel. In this scheme, one participant prepares for a Gaussian-modulated coherent state (GMCS) transmitted to other participants subsequently. The remaining participants insert independent GMCS prepared locally into the circulating optical modes. The dealer measures the phase and the amplitude quadratures by using double homodyne detectors, and distributes the secret to all participants respectively. Special t out of n participants could recover the original secret using the Lagrange interpolation and their encoded random numbers. Security analysis shows that it could satisfy the secret sharing constraint which requires the legal participants to recover message in a large group. This scheme is more robust against background noise due to the employment of double homodyne detection, which relies on standard apparatuses, such as amplitude and phase modulators, in favor of its potential practical implementations.


Sign in / Sign up

Export Citation Format

Share Document