The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new weighted threshold signature based on Iftene's general secret sharing scheme and the RSA threshold signature, which is itself based on the Chinese reminder theorem. In our scheme, group members are divided into different subgroups, and a positive weight is associated to each subgroup, where all members of the same subgroup have the same weight. The group signature can be...
This study presents a novel scheme called a dual verifying (t, n) visual secret sharing scheme. In our proposed scheme, each participant receives a public key and an encrypted shadow instead of the original secret image through the public communication network. There are three goals achieved. The first is to generate a reconstructed secret image, which satisfies the general criteria high security,...
In the paper, we propose a new cryptographic notion, signing key sharing. Based on the notion, we present various types of signing key sharing schemes, such as proxy signature schemes, schemes for generating and sharing a signing key among a group, and (t,n) -threshold group proxy signature scheme. We also investigate the security conditions, the signer authentication and signer nonrepudiation of...
Nowadays, digital signature schemes are widely used in electronic commerce. Thus, various digital signature schemes are proposed to make the electronic transactions more convenient. In 2007, Chung et al. proposed an ID-based digital signature scheme on elliptic curve cryptosystem (ECC). They claimed that their scheme is secure because it is based upon the difficulty of elliptic curve discrete logarithm...
Proxy signature scheme is a method to delegate the signing authorization to one or more designated proxy signers. Only authorized proxy signers are able to generate a proxy signature on behalf of the original signer. Although many excellent studies on proxy signature schemes have been proposed, most of these schemes are mainly focused on dealing with (1, 1), (1, n), or (t, n) threshold proxy signature...
In practical applications, an official document may be involved in several subjects or departments, and it usually needs to be reviewed by different levels of participant managers in a linearly hierarchical organization. Each reviewer would give some comments for those documents and sends them to the next reviewer for the further review. In an organization, the order of reviewers depends on the hierarchical...
Since the blind signature scheme has the unlinkability property, it can be used for untraceable electronic cash systems. The unlinkability property protects the privacy of users; however, it may be abused by criminals, e.g., to launder money or to safely get a ransom. The techniques of fair blind signature are developed to withstand the misuse of unlinkability property. In this paper, we propose not...
Recently, an improved digital signature scheme was proposed by He. However, there is a weakness in He's scheme, where the forgers can forge valid signatures. In this paper, we show that there is also a drawback that a public key may have more than one corresponding secret key, where the verifier cannot determine who the real signer is. As a result, we improve He's scheme to overcoming the above flaws...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.