Author of the publication

Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders.

, , and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 194-204. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revocation-free public-key encryption based on security-mediated public-key infrastructure., , and . IET Inf. Secur., 1 (3): 134-141 (2007)Conspiracy Attacks on the Threshold RSA Signature Scheme., , and . Cryptologia, 18 (4): 372-380 (1994)Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders., , and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 194-204. Springer, (1994)Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols., , and . IEEE Trans. Dependable Secur. Comput., 4 (1): 71-80 (2007)Authenticated semi-quantum key distributions without classical channel., , , and . Quantum Inf. Process., 15 (7): 2881-2893 (2016)Identity-based Hierarchical Designated Decryption., , and . J. Inf. Sci. Eng., 26 (4): 1243-1259 (2010)Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem., , and . Informatica, 18 (1): 61-66 (2007)Remark on the Threshold RSA Signature Scheme., , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 413-420. Springer, (1993)(T, N) Threshold-Multisignature Scheme and Generalized-Multisignature Scheme Where suspected Forgery Implies Traceability of Adversarial Shareholders., , , and . Cryptologia, 24 (3): 250-268 (2000)(t, n) Threshold Untraceable Signatures., , and . J. Inf. Sci. Eng., 16 (6): 835-846 (2000)