An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Abstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper s...
Saved in:
Main Authors: | Hossein Pilaram, Taraneh Eghlidos, Rahim Toluee |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-01-01
|
Series: | IET Information Security |
Subjects: | |
Online Access: | https://doi.org/10.1049/ise2.12007 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
by: Ferucio Laurenţiu Ţiplea, et al.
Published: (2021-07-01) -
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
by: Yumei Li, et al.
Published: (2021-01-01) -
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
by: Kunwar Singh, et al.
Published: (2021-01-01) -
Forward secure proxy signature scheme
by: WANG Xiao-ming, et al.
Published: (2005-01-01) -
Efficiency identity-based threshold group signature scheme
by: LIU Hong-wei 1, et al.
Published: (2009-01-01)