Anonymous t-out-of-N Threshold Signature Schemes
In many multi-user cryptographic applications (e.g., electronic voting, digital lotteries, e-cash application, anonymous access to some resources, etc.), anonymity pops up as one of the main security objectives. Protecting private information about the involved users is not only desirable but crucia...
Other Authors: | |
---|---|
Format: | Others |
Language: | English English |
Published: |
Florida State University
|
Subjects: | |
Online Access: | http://purl.flvc.org/fsu/fd/FSU_migr_etd-2755 |