On the value of threshold signatures

Borselius, Niklas, Mitchell, Chris J and Wilson, Aaron

(2002)

Borselius, Niklas, Mitchell, Chris J and Wilson, Aaron (2002) On the value of threshold signatures. Operating Systems Review, 36 (4).

Our Full Text Deposits

Full text access: Open

Full Text - 210.3 KB

Full Text - 117.21 KB

Full text file - 117.21 KB

Links to Copies of this Item Held Elsewhere


Abstract

Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4]. The purpose of this paper is to present a rather simple alternative to threshold signatures which raises questions about the value of such schemes, at least when applied to the mobile agent scenario.

Information about this Version

This is a Submitted version
This version's date is: 10/2002
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/0a2cff14-4d1f-a81c-976c-1b66bb740cd8/2/

Item TypeJournal Article
TitleOn the value of threshold signatures
AuthorsBorselius, Niklas
Mitchell, Chris J
Wilson, Aaron
Uncontrolled Keywordsmobile agent, digital signature, threshold signature, security
DepartmentsFaculty of Science\Mathematics
Research Groups and Centres\Information Security\ Information Security Group

Identifiers

doihttp://dx.doi.org/10.1145/583800.583804

Deposited by Research Information System (atira) on 24-May-2012 in Royal Holloway Research Online.Last modified on 24-May-2012

Notes

This is the final draft version of the paper that appeared in the journal 'ACM SIGOPS Operating Systems Review', 36(4), 2002.


Details