Analysis and construction for threshold signature scheme based on game theory

被引:0
|
作者
College of Computer Science, Beijing University of Technology, Beijing [1 ]
100124, China
不详 [2 ]
041004, China
不详 [3 ]
550025, China
机构
来源
关键词
D O I
10.11959/j.issn.1000-436x.2015189
中图分类号
学科分类号
摘要
19
引用
收藏
相关论文
共 50 条
  • [1] A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
    Melchor, Carlos Aguilar
    Cayrel, Pierre-Louis
    Gaborit, Philippe
    Laguillaumie, Fabien
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (07) : 4833 - 4842
  • [2] A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
    Melchor, Carlos Aguilar
    Cayrel, Pierre-Louis
    Gaborit, Philippe
    [J]. POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 1 - 16
  • [3] Analysis on a threshold digital signature scheme
    Deng, Suping
    Xu, Qiuliang
    [J]. 2002, Shanghai Computer Society (28):
  • [4] Security Analysis of a Paillier-based Threshold Proxy Signature Scheme
    Zheng, Minghui
    Cui, Yongquan
    Chen, Liang
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 683 - 687
  • [5] Analysis and Improvement of a Threshold Signature Scheme Based on the General Access Structure
    Cai Yongquan
    Zhang En
    Cheng Fula
    [J]. CEIS 2011, 2011, 15
  • [6] A multivariate based threshold ring signature scheme
    Petzoldt, Albrecht
    Bulygin, Stanislav
    Buchmann, Johannes
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2013, 24 (3-4) : 255 - 275
  • [7] Partially Blind Signature Scheme Based on Threshold
    Wu, Yue
    Wang, Lijun
    Long, Shigong
    [J]. 2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 512 - 516
  • [8] A multivariate based threshold ring signature scheme
    Albrecht Petzoldt
    Stanislav Bulygin
    Johannes Buchmann
    [J]. Applicable Algebra in Engineering, Communication and Computing, 2013, 24 : 255 - 275
  • [9] Threshold ring signature scheme based on the curve
    Kuwakado, H
    Tanaka, H
    [J]. 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 139 - 139
  • [10] Threshold undeniable signature scheme based on conic
    Lu, RX
    Cao, ZF
    Zhou, Y
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) : 165 - 177