Secure obfuscation for encrypted threshold signatures
Aiming at the key leakage security problem of the threshold signature,an encrypted threshold signature functionality was firstly proposed and securely obfuscated.The output of obfuscated circuit could be implemented by any third party without revealing the private key of threshold signature.Secondly...
Saved in:
| Main Authors: | Yahong LI, Caifen WANG, Yulei ZHANG, Xiaodong YANG, Haiyan HUANG |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2020-06-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020129/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Performance evaluations of AI-based obfuscated and encrypted malicious script detection with feature optimization
by: Kookjin Kim, et al.
Published: (2025-08-01) -
Obfuscated malicious traffic detection based on data enhancement
by: Ke Ye, et al.
Published: (2025-07-01) -
Research on the searchable encryption
by: Peng XU, et al.
Published: (2016-10-01) -
Provably secure and efficient escrowable public key encryption schemes
by: Wen-hao LIU, et al.
Published: (2014-07-01) -
Adaptive federated learning secure aggregation scheme based on threshold homomorphic encryption
by: Zhuo MA, et al.
Published: (2023-07-01)