An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Abstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper s...
Saved in:
Main Authors: | Hossein Pilaram, Taraneh Eghlidos, Rahim Toluee |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-01-01
|
Series: | IET Information Security |
Subjects: | |
Online Access: | https://doi.org/10.1049/ise2.12007 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
by: Ferucio Laurenţiu Ţiplea, et al.
Published: (2021-07-01) -
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
by: Yumei Li, et al.
Published: (2021-01-01) -
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
by: Kunwar Singh, et al.
Published: (2021-01-01) -
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
by: Yevhen Kotukh, et al.
Published: (2024-06-01) -
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
by: Huiwen Jia, et al.
Published: (2022-01-01)