NDLI logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Wuhan University Journal of Natural Sciences
  2. Wuhan University Journal of Natural Sciences : Volume 10
  3. Wuhan University Journal of Natural Sciences : Volume 10, Issue 1, January 2005
  4. Robust threshold Guillou-Quisquater signature scheme
Loading...

Please wait, while we are loading the content...

Wuhan University Journal of Natural Sciences : Volume 22
Wuhan University Journal of Natural Sciences : Volume 21
Wuhan University Journal of Natural Sciences : Volume 20
Wuhan University Journal of Natural Sciences : Volume 19
Wuhan University Journal of Natural Sciences : Volume 18
Wuhan University Journal of Natural Sciences : Volume 17
Wuhan University Journal of Natural Sciences : Volume 16
Wuhan University Journal of Natural Sciences : Volume 15
Wuhan University Journal of Natural Sciences : Volume 14
Wuhan University Journal of Natural Sciences : Volume 13
Wuhan University Journal of Natural Sciences : Volume 12
Wuhan University Journal of Natural Sciences : Volume 11
Wuhan University Journal of Natural Sciences : Volume 10
Wuhan University Journal of Natural Sciences : Volume 10, Issue 6, November 2005
Wuhan University Journal of Natural Sciences : Volume 10, Issue 5, September 2005
Wuhan University Journal of Natural Sciences : Volume 10, Issue 4, July 2005
Wuhan University Journal of Natural Sciences : Volume 10, Issue 3, May 2005
Wuhan University Journal of Natural Sciences : Volume 10, Issue 2, March 2005
Wuhan University Journal of Natural Sciences : Volume 10, Issue 1, January 2005
A security kernel architecture based trusted computing platform
Fault-tolerant design techniques in A CMP architecture
Investigation on relationship between cost and software reliability
Fault tolerant approach for data encryption and digital signature based on ECC system
Simultaneous multithreading fault tolerance processor
An adaptive trust model of web services
HermitFS: A secure storage system in the open environment
An FPGA implementation of GF (p) elliptic curve cryptographic coprocessor
Analysis and application for integrity model on trusted platform
SLID: A secure lowest-ID clustering algorithm
Formal verification under unknown constraints
Building intrusion tolerant software system
TRSTR: A fault-tolerant microprocessor architecture based on SMT
Extension of subjective logic for time-related trust
An efficient crash recovery technique for real-time main memory database
Access request trustworthiness in weighted access control framework
Research on fault tolerant scheduling algorithms of web cluster based on probability
Survivability specification framework for dependability-functionality codesign of ERTS
Methods for increasing creditability of anomaly detection system
Mechanism and defense on malicious code
Two-stage algorithm for correlating the intrusion alerts
A Micro-payment based Isolation of Misbehavior secure routing for sensor network
Implementation and performance evaluation of IPSec VPN based on netfilter
Masquerade detection using support vector machine
A new (t, n) threshold signature scheme withstanding the conspiracy attack
MA-IDS: A distributed intrusion detection system based on data mining
A neural network approach for misuse and anomaly intrusion detection
Intelligent intrusion detection system model using rough neural network
A new communication scheme for threshold certificate authority in ad hoc networks
SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks
Complex threshold key management for ad hoc network
Privilege flow oriented intrusion detection based on Hidden semi-Markov model
A cluster-based secure active network environment
Immune based intrusion detector generating algorithm
Security communication model of wireless trade system
A novel model of IDS based on fuzzy cluster and immune principle
A network-based VPN architecture using virtual routing
Verifiable (t, n) threshold signature scheme based on elliptic curve
An intrusion alarming system based on self-similarity of network traffic
Addition sequence method of scalar multiplication of elliptic curve over OEF
Evolutionary design of boolean functions
Cryptanalysis of the one-time proxy signature scheme used in mobile agents
A proxy signature scheme as secure as decisional Diffie-Hellman problem
A secure and efficient (t, n) multi-secret sharing scheme
Correlation degree and correlation coefficient of multi-output functions
Construction of resilient functions
Fair electronic payment scheme based on DSA
Robust threshold Guillou-Quisquater signature scheme
Statistical characteristics of the complexity for prime-periodic sequences
Towards the idealization procedure of BAN-like logics
A new proxy signature scheme with message recovery using self-certified public key
A nominative multi-proxy signature scheme based on ECC
Atomic electronic contract protocol based on convertible signature
Cryptanalysis and improvement of signcryption schemes on elliptic curves
An identity-based key-exchange protocol
Polynomial analysis of DH secrete key and bit security
Threshold decryption scheme with multiple policies
Efficient identity based signcryption scheme with public verifiability and forward security
Distribution of random session key based on key-insulated public-key cryptosystems
An efficient threshold blind signature from weil pairing
Algebraic attack on Filter-Combiner model keystream generators
A new threshold signature scheme using self-certified public keys
Efficient authenticated key agreement protocol using self-certified public keys from pairings
An anonymous payment protocol with mobile agents in hostile environments
A formal model for the security of proxy signature schemes
Wavelet-based denoising attack on image watermarking
Semi-fragile watermarking for copyright protection and image authentication
A secure public-key image authentication plan
Data hiding and security for XML database: A TRBAC-based approach
Turbo-based DNW algorithm for compressed video in VLC domain
A new images hiding scheme based on chaotic sequences
Robustness proof on a united watermarking based on CRT theorem
A novel digital audio watermarking scheme in the wavelet domain
Information-theoretic analysis for the difficulty of extracting hidden information
A geometrical transformations resistant digital watermarking based on quantization
A family of RBAC-based workflow authorization models
A role-based PMI security model for e-government
Model checking electronic commerce security protocols based on CTL
Wuhan University Journal of Natural Sciences : Volume 9
Wuhan University Journal of Natural Sciences : Volume 8
Wuhan University Journal of Natural Sciences : Volume 7
Wuhan University Journal of Natural Sciences : Volume 6
Wuhan University Journal of Natural Sciences : Volume 5
Wuhan University Journal of Natural Sciences : Volume 4
Wuhan University Journal of Natural Sciences : Volume 3
Wuhan University Journal of Natural Sciences : Volume 2

Similar Documents

...
A secure and efficient (t, n) multi-secret sharing scheme

Article

...
SLID: A secure lowest-ID clustering algorithm

Article

...
An efficient and secure multi-secret sharing scheme with general access structures

Article

...
Generalized group signature scheme

Article

...
Verifiable (t, n) threshold signature scheme based on elliptic curve

Article

...
Consideration of the XOR-operation Based Secure Multiparty Computation

Article

...
Server-assisted forward-secure threshold signature

Article

...
Forward-secure signatures with optimal signing and verifying (2001)

...
On Codes, Matroids and Secure Multi-Party Computation from Linear Secret Sharing Schemes (2004)

Article

Robust threshold Guillou-Quisquater signature scheme

Content Provider SpringerLink
Author Hong, Wang Zhen feng, Zhang Deng guo, Feng
Copyright Year 2005
Abstract The deficiencies of the first threshold Guillou-Quisquater signature scheme presented by Li-San Liu, Cheng-Kang Chu and Wen-Guey Tzeng are analysised at first, and then a new threshold Guillou-Quisquater signature scheme is presented. The new scheme is unforgeable and robust against any adaptive adversary if the base Guillou-Quisquater signature scheme is unforgeable under the chosen massage attack and computing the discrete logarithm modulo a prime is hard. This scheme can also achieve optimal resilience. However, the new scheme does not need the assumption that N is the product of two safe primes. The basic signature scheme underlying the new scheme is exactly Guillou-Quisquater signature scheme, and the additional strong computation assumption introduced by the first threshold Guillou-Quisquater scheme is weaken.
Starting Page 207
Ending Page 210
Page Count 4
File Format PDF
ISSN 10071202
Journal Wuhan University Journal of Natural Sciences
Volume Number 10
Issue Number 1
e-ISSN 19934998
Language English
Publisher Wuhan University
Publisher Date 2005-01-01
Publisher Place Wuhan
Access Restriction Subscribed
Subject Keyword veriable secret sharing threshold cryptography cigital signature scheme robust secure multiparty computation Mathematics Computer Science Physics Life Sciences
Content Type Text
Resource Type Article
Subject Multidisciplinary
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...