Threshold signatures: Current status and key issues

Min Shiang Hwang, Ting-Yi  Chang

Research output: Contribution to journalArticle

16 Citations (Scopus)

Abstract

In this paper, we survey all related threshold signature schemes and classify them with different properties. In order to compare them with different properties, we image there is an ideal threshold signature scheme which satisfies all requirements of threshold signature schemes. Based on this ideal threshold signature, readers can eas-ily to understand what the next generation of threshold signature schemes is and attempt to propose it.

Original languageEnglish
Pages (from-to)123-137
Number of pages15
JournalInternational Journal of Network Security
Volume1
Issue number3
Publication statusPublished - 2005 Dec 1

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Cite this

@article{3d1be031bc3c4871ade26d54297f7507,
title = "Threshold signatures: Current status and key issues",
abstract = "In this paper, we survey all related threshold signature schemes and classify them with different properties. In order to compare them with different properties, we image there is an ideal threshold signature scheme which satisfies all requirements of threshold signature schemes. Based on this ideal threshold signature, readers can eas-ily to understand what the next generation of threshold signature schemes is and attempt to propose it.",
author = "Hwang, {Min Shiang} and Ting-Yi  Chang",
year = "2005",
month = "12",
day = "1",
language = "English",
volume = "1",
pages = "123--137",
journal = "International Journal of Network Security",
issn = "1816-353X",
publisher = "National Chung Hsing University",
number = "3",

}

Threshold signatures : Current status and key issues. / Hwang, Min Shiang; Chang, Ting-Yi .

In: International Journal of Network Security, Vol. 1, No. 3, 01.12.2005, p. 123-137.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Threshold signatures

T2 - Current status and key issues

AU - Hwang, Min Shiang

AU - Chang, Ting-Yi 

PY - 2005/12/1

Y1 - 2005/12/1

N2 - In this paper, we survey all related threshold signature schemes and classify them with different properties. In order to compare them with different properties, we image there is an ideal threshold signature scheme which satisfies all requirements of threshold signature schemes. Based on this ideal threshold signature, readers can eas-ily to understand what the next generation of threshold signature schemes is and attempt to propose it.

AB - In this paper, we survey all related threshold signature schemes and classify them with different properties. In order to compare them with different properties, we image there is an ideal threshold signature scheme which satisfies all requirements of threshold signature schemes. Based on this ideal threshold signature, readers can eas-ily to understand what the next generation of threshold signature schemes is and attempt to propose it.

UR - http://www.scopus.com/inward/record.url?scp=33846354789&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33846354789&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:33846354789

VL - 1

SP - 123

EP - 137

JO - International Journal of Network Security

JF - International Journal of Network Security

SN - 1816-353X

IS - 3

ER -