Publication
Journal of Computer and System Sciences
Paper

New efficient and secure protocols for verifiable signature sharing and other applications

View publication

Abstract

New protocols for RSA, Rabin, and DSS VΣS are presented. The protocols are efficient and probably secure and can tolerate the malicious behavior of up to half of the proxies. The RSA VΣS scheme is based on a completely novel approach. The recipient of the signature will simply encrypt using a threshold cryptosystems, a public key whose matching secret key is kept shared at the proxies.

Date

Publication

Journal of Computer and System Sciences

Authors

Topics

Share