Secure order-specified multisignature scheme based on DSA
โ Scribed by Yang Muxiang; Su Li; Li Jun; Hong Fan
- Publisher
- Wuhan University
- Year
- 2006
- Tongue
- English
- Weight
- 354 KB
- Volume
- 11
- Category
- Article
- ISSN
- 1007-1202
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
## For improving proxy-signature research, Sun [5] attempted to resolve problems related to defective security in the scheme of Yi [3]. However, both Yi and Sun's schemes involve a significant number of exponential operations to verify the proxy signature. Accordingly, an improvement is proposed her
## Abstract In TV program distribution, the receiver's identification information is embedded into video data in order to trace illegal distributors, and video data are encrypted in order to protect the confidentiality against unauthorized users. In traditional method, the TV program is firstly fin
Blind signature is a well-known technique used to construct some advanced applications for the consideration of user privacy. Various generic ideas and variants on blind signatures have been brought up so far, but few of them considered the randomization property or offered formal proofs. The concep