-
1
Universal composable threshold signature
Published 2009-01-01Subjects: “…threshold signature;UC framework;UC security;proactive threshold signature…”
Get full text
Article -
2
Universal composable threshold signature
Published 2009-01-01Subjects: “…threshold signature…”
Get full text
Article -
3
Review and Analysis of Cryptographic Schemes Implementing Threshold Signature
Published 2015-03-01Subjects: Get full text
Article -
4
-
5
Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer
Published 2024-09-01Subjects: Get full text
Article -
6
A secure cross-domain authentication scheme based on threshold signature for MEC
Published 2024-03-01Subjects: Get full text
Article -
7
Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature
Published 2022-08-01Subjects: Get full text
Article -
8
Designated confirmer threshold signature and its applications in blockchains
Published 2024-12-01Subjects: Get full text
Article -
9
Telemedicine data secure sharing scheme based on heterogeneous federated learning
Published 2024-10-01Subjects: Get full text
Article -
10
Analysis and construction for threshold signature scheme based on game theory
Published 2015-05-01Subjects: “…game theory;threshold signature;bilinear pairings;BDH assumption;Nash equilibrium…”
Get full text
Article -
11
-
12
Analysis and construction for threshold signature scheme based on game theory
Published 2015-05-01Subjects: Get full text
Article -
13
Classical Communication Coset State (t,n) Threshold Quantum Digital Signature
Published 2023-01-01Subjects: Get full text
Article -
14
ID-based on-line/off-line threshold signature scheme without bilinear pairing
Published 2013-08-01Subjects: “…on-line/off-line threshold signature…”
Get full text
Article -
15
ID-based on-line/off-line threshold signature scheme without bilinear pairing
Published 2013-08-01Subjects: “…on-line/off-line threshold signature;identity-based cryptography;bilinear pairing;simulability…”
Get full text
Article -
16
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices
Published 2023-07-01Subjects: Get full text
Article -
17
Power 5G trusted data feed technology based on Oracle mechanism
Published 2022-11-01Subjects: Get full text
Article -
18
Certificateless threshold signature from lattice
Published 2024-08-01Subjects: Get full text
Article -
19
Secure obfuscation for encrypted threshold signatures
Published 2020-06-01Subjects: “…obfuscation;encrypted threshold signature;encrypted private key;average case virtual black box property…”
Get full text
Article -
20
Secure obfuscation for encrypted threshold signatures
Published 2020-06-01Subjects: Get full text
Article