Login / Signup
How to Prove Schnorr Assuming Schnorr: Security of Multi- and Threshold Signatures.
Elizabeth C. Crites
Chelsea Komlo
Mary Maller
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
intrusion detection
information security
security issues
signcryption scheme
factor authentication
information assurance
database
access control
security requirements
data security
signature verification
security properties
security threats
security management
adaptive threshold