The Research of Secret Data Dispatch--an Application of Dual Complex Threshold Signature Scheme
碩士 === 國防管理學院 === 國防資訊研究所 === 96 === At present most of the efforts made by the information security has focused on the prevention from external threats, internal protection measures mostly form ofthe policy of promoting it, such negative for the good of humanity depend on theway, unable to curb leg...
Main Authors: | Te-Feng Hsu, 徐德風 |
---|---|
Other Authors: | Jen-Rong Chen |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/09035235854914138008 |
Similar Items
-
A Fully Adaptively Secure Threshold Signature Scheme Based on Dual-Form Signatures Technology
by: Yuanju Gan
Published: (2021-01-01) -
Threshold Signature Schemes Application
by: Anastasiya Victorovna Beresneva, et al.
Published: (2015-10-01) -
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
by: Hossein Pilaram, et al.
Published: (2021-01-01) -
Secret Sharing with Threshold Schemes
by: Johansson, Håkan
Published: (2020) -
Threshold Signature Scheme with Message Recovery
by: Chang-Hung Wu, et al.
Published: (2000)