Research noteTwo ID-based multisignature protocols for sequential and broadcasting architectures
References (13)
- et al.
Identity-based conference key broadcast schemes with authentication
- et al.
How to prove yourself: practical solutions to identification and signature problem
- et al.
A method for obtaining digital signature and public-key cryptosystem
Commun. ACM
(1978) Identity-based cryptosystems and signature schemes
- et al.
A practical digital multisignature scheme based on discrete logarithms
- et al.
New scheme for digital multisignatures
Electr. Lett.
(1989)
There are more references available in the full text version of this article.
Cited by (23)
Provably secure multi-signature scheme based on the standard SM2 signature scheme
2024, Computer Standards and InterfacesA post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things
2023, Future Generation Computer SystemsCitation Excerpt :After this, Horster et al. [15] proposed a meta-multi-signature scheme based on discrete logarithm, and then Wu et al. [16] constructed two ID-based multi-signature schemes which were divided into sequential and broadcasting architectures. To minimize the communication and storage burden, Gentry et al. [17] proposed the first identity-based multi-signature scheme. Maxwell et al. [18] proposed a simple Schnorr multi-signatures scheme called MuSig.
Convertible multi-authenticated encryption scheme
2008, Information SciencesNew multisignature scheme for specified group of verifiers
2004, Applied Mathematics and ComputationGroup-oriented signature scheme with distinguished signing authorities
2004, Future Generation Computer SystemsID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures
2002, Applied Mathematics and Computation
Copyright © 1996 Published by Elsevier B.V.