Author of the publication

Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders.

, , and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 194-204. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remark on the Threshold RSA Signature Scheme., , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 413-420. Springer, (1993)On the security of Park et al.'s key distribution protocol for digital mobile communications., and . PIMRC, page 1248-1251. (1996)Improved remote authentication scheme with smart card., and . Comput. Stand. Interfaces, 27 (2): 177-180 (2005)On Zhang's Nonrepudiable Proxy Signature Schemes., , and . ACISP, volume 1438 of Lecture Notes in Computer Science, page 415-422. Springer, (1998)(t, n) Threshold Untraceable Signatures., , and . J. Inf. Sci. Eng., 16 (6): 835-846 (2000)Group-oriented undeniable signature schemes with a trusted center., and . Comput. Commun., 22 (8): 730-734 (1999)On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives., , and . ISW, volume 1729 of Lecture Notes in Computer Science, page 47-51. Springer, (1999)Privacy Protection Technology and Access Control Mechanism for Medical Big Data., and . IIAI-AAI, page 424-429. IEEE Computer Society, (2017)Cloud Server Aided Computation for ElGamal Elliptic Curve Cryptosystem., , and . COMPSAC Workshops, page 11-15. IEEE Computer Society, (2013)Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders., , and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 194-204. Springer, (1994)