Login / Signup
On Signature Schemes with Threshold Verification Detecting Malicious Verifiers.
Holger Petersen
Markus Michels
Published in:
Security Protocols Workshop (1997)
Keyphrases
</>
signature scheme
detecting malicious
standard model
threshold signature scheme
public key
detect malicious
signcryption scheme
designated verifier
model checking
secret key
key distribution
blind signature
digital signature
cryptographic protocols
private key
hash functions
web pages
bilinear pairings
security model