Title
Some Protocols Useful on the Internet from Threshold Signature Schemes
Abstract
In a threshold signature scheme, a group of playersshares some secret information in such a way that onlythose subsets with a minimum number of players can computea valid signature. In this paper we propose methodsto construct some computationally secure distributed protocolsfrom threshold signature schemes.Namely, we construct metering schemes from thresholdnon-interactive signature schemes. We also show thatthreshold deterministic signature schemes can be used todesign distributed key distribution schemes. Furthermore,the constructed protocols attain some desirable propertiesand have useful applications on the Internet.
Year
DOI
Venue
2003
10.1109/DEXA.2003.1232048
DEXA Workshops
Keywords
Field
DocType
Internet,access protocols,cryptography,message authentication,public key cryptography,Internet,deterministic signature schemes,distributed cryptography,distributed key distribution,metering schemes,noninteractive signature schemes,secret information,secure distributed protocols,threshold signature schemes,valid signature
Key distribution,Data mining,Cryptography,Computer science,Commitment scheme,Computer network,Theoretical computer science,Digital signature,Threshold cryptosystem,Blind signature,Key (cryptography),Schnorr signature
Conference
ISBN
Citations 
PageRank 
0-7695-1993-8
2
0.38
References 
Authors
12
3
Name
Order
Citations
PageRank
Vanesa Daza121120.62
Javier Herranz262831.52
Germán Sáez326718.36