Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"

In a (t, n) threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t-1 or fewer of them can't do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers. I...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG, Guilin, BAO, Feng, ZHOU, Jianying, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2004
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1086
https://ink.library.smu.edu.sg/context/sis_research/article/2085/viewcontent/Comments_Threshold.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
Be the first to leave a comment!
You must be logged in first