2011
DOI: 10.1016/j.csi.2011.01.004
|View full text |Cite
|
Sign up to set email alerts
|

Threshold signature schemes for ElGamal variants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…In group-oriented cryptography, there are two basic adversarial models: static and adaptive. In the static model, the adversary fixes a subset of participants that she wants to corrupt before the protocol starts [3,4]. In the adaptive model, the adversary waits for an appropriate time during the protocol execution.…”
Section: Introductionmentioning
confidence: 99%
“…In group-oriented cryptography, there are two basic adversarial models: static and adaptive. In the static model, the adversary fixes a subset of participants that she wants to corrupt before the protocol starts [3,4]. In the adaptive model, the adversary waits for an appropriate time during the protocol execution.…”
Section: Introductionmentioning
confidence: 99%
“…Harn [10] combined a modified ElGamal scheme and Shamir's secret sharing into a (t, n) threshold signature scheme. Kim et al [11] extended Harn's scheme to all ElGamal variants.…”
Section: Introductionmentioning
confidence: 99%
“…In general, there are four types of threshold signatures, which can be described as follows. The threshold signature in traditional PKC has been studied in . Desmedt and Frankel proposed the first ( t , n ) threshold signature scheme based on the Rivest–Shamir–Adleman assumption and Shamir's secret sharing.…”
Section: Introductionmentioning
confidence: 99%