Corpus ID: 16272912

5.2 Veriiable Signature Sharing

@inproceedings{Franklin197952VS,
  title={5.2 Veriiable Signature Sharing},
  author={Matthew K. Franklin and Reiter and Springer-Verlag and A R L Rivest and Lior Shamir and Adleman and M Tatebayashi and N Matsuzakai and David B. Newman and Key},
  year={1979}
}
A linear protocol failure for RSA with exponent three. A method for obtaining digital signatures and public-key cryptosystems. distribution protocol for digital mobile communication systems. are linear combinations of the unknowns b j with known coeecients, S i0 can compute a linear relation that holds among the shares: k X j=0 p j Bi j = 0 m o d N: 2 Since server S i0 knows p 0 Bi 0 , which is nonzero with high probability, it can learn an inhomogeneous linear relation among the other k terms… Expand
2 Citations
On signature schemes with thresholdveri cation detecting malicious veri ersHolger
While in the ordinary digital signature model one veriier is suucient to check the validity of a given signature, there are situations in which only t out of a group of n veriiers should be able toExpand
On Signature Schemes with Threshold Verification Detecting Malicious Verifiers
TLDR
The solutions demonstrate the close relation between signature schemes with threshold verification and threshold cryptosystems and new protocols for the two other concepts are presented. Expand