[PDF][PDF] Authenticated Encryption Schemes: Current Status and Key Issues.

MS Hwang, CY Liu - Int. J. Netw. Secur., 2005 - isrc.asia.edu.tw
Nyberg and Ruppel first proposed a signature scheme with message recovery based on
DSA in 1993, and the authenticated encryption scheme is a special application of their …

A threshold signature scheme for group communications without a shared distribution center

TY Chang, CC Yang, MS Hwang - Future Generation Computer Systems, 2004 - Elsevier
In this paper, we shall propose a (t, n) threshold signature with (k, l) threshold-shared
verification to be used in a group-oriented cryptosystem without a shared distribution center …

A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification

SF Tzeng, CY Yang, MS Hwang - Future Generation Computer Systems, 2004 - Elsevier
In this paper, we shall propose a threshold multi-proxy multi-signature scheme with shared
verification. In the scheme allows the group of original signers to delegate the signing …

Improvements of generalization of threshold signature and authenticated encryption for group communications

CL Hsu, TS Wu, TC Wu - Information Processing Letters, 2002 - Elsevier
Recently, Wang et al. proposed a (t, n) threshold signature scheme with (k, l) threshold
shared verification and a group-oriented authenticated encryption scheme with (k, l) …

A new proxy signature scheme for a specified group of verifiers

MS Hwang, CC Lee, SF Tzeng - Information Sciences, 2013 - Elsevier
In this article, we shall propose a ((t1, n1),(t2, n2)) proxy signature scheme with (t3, n3)
shared verification based on the RSA problem. In this scheme, any t1 original signers can …

Oscillation criteria for second-order quasi-linear delay dynamic equations on time scales

AF Güvenilir, F Nizigiyimana - Advances in Difference Equations, 2014 - Springer
This paper is concerned with oscillations of the second-order delay nonlinear dynamic
equation (a (t)(x Δ (t)) α) Δ+ q (t) x β (τ (t))= 0 on a time scale, where a and q are real-valued …

[PDF][PDF] Threshold Signatures: Current Status and Key Issues.

MS Hwang, TY Chang - Int. J. Netw. Secur., 2005 - researchgate.net
In this paper, we survey all related threshold signature schemes and classify them with
different properties. In order to compare them with different properties, we image there is an …

一种面向群组通信的通用门限签密方案

彭长根, 李祥, 罗文俊 - 电子学报, 2007 - ejournal.org.cn
基于椭圆曲线密码体制和Schnorr 数字签名体制, 建立了一个同时具有(t, n) 门限签密和(k, l)
共享验证功能的通用门限方案. 该方案克服了Wang 等人方案的安全缺陷和Hsu …

On the security of generalization of threshold signature and authenticated encryption

YM Tseng, JK Jan, HY Chien - IEICE Transactions on …, 2001 - search.ieice.org
In 2000, Wang et al. proposed a new (t, n) threshold signature scheme with (k, l) threshold
shared verification. Meanwhile, integrating the idea of message recovery, they also …

[引用][C] 密文数据库系统的设计

李新 - 计算机工程与应用, 2005