Abstract | ||
---|---|---|
In a threshold signature scheme, a group of playersshares some secret information in such a way that onlythose subsets with a minimum number of players can computea valid signature. In this paper we propose methodsto construct some computationally secure distributed protocolsfrom threshold signature schemes.Namely, we construct metering schemes from thresholdnon-interactive signature schemes. We also show thatthreshold deterministic signature schemes can be used todesign distributed key distribution schemes. Furthermore,the constructed protocols attain some desirable propertiesand have useful applications on the Internet. |
Year | DOI | Venue |
---|---|---|
2003 | 10.1109/DEXA.2003.1232048 | DEXA Workshops |
Keywords | Field | DocType |
Internet,access protocols,cryptography,message authentication,public key cryptography,Internet,deterministic signature schemes,distributed cryptography,distributed key distribution,metering schemes,noninteractive signature schemes,secret information,secure distributed protocols,threshold signature schemes,valid signature | Key distribution,Data mining,Cryptography,Computer science,Commitment scheme,Computer network,Theoretical computer science,Digital signature,Threshold cryptosystem,Blind signature,Key (cryptography),Schnorr signature | Conference |
ISBN | Citations | PageRank |
0-7695-1993-8 | 2 | 0.38 |
References | Authors | |
12 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Vanesa Daza | 1 | 211 | 20.62 |
Javier Herranz | 2 | 628 | 31.52 |
Germán Sáez | 3 | 267 | 18.36 |