Secure obfuscation for encrypted threshold signatures
Aiming at the key leakage security problem of the threshold signature,an encrypted threshold signature functionality was firstly proposed and securely obfuscated.The output of obfuscated circuit could be implemented by any third party without revealing the private key of threshold signature.Secondly...
Saved in:
Main Authors: | Yahong LI, Caifen WANG, Yulei ZHANG, Xiaodong YANG, Haiyan HUANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2020-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020129/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research on the searchable encryption
by: Peng XU, et al.
Published: (2016-10-01) -
Attribute-based encryption schema with group signatures
by: Xinglan ZHANG, et al.
Published: (2019-02-01) -
Universal composable threshold signature
by: HONG Xuan1, et al.
Published: (2009-01-01) -
Traceable attribute-based encryption scheme with key-delegation abuse resistance
by: Xixi YAN, et al.
Published: (2020-04-01) -
Design of multi-key encryption method
by: Yuqing ZHONG, et al.
Published: (2020-11-01)