This paper presents a directed (or designated-receiver) signature scheme with the property that the signature can be verified only with the help of the signature receiver. Such signatures are intended to protect the privacy of the signature receiver in applications where the signed message contains information personally sensitive to the receiver. We also present its application to shared verification of signatures and threshold cryptosystems. The resulting group-oriented cryptosystems are fully dynamic and scalable.
CITATION STYLE
Lim, C. H., & Lee, P. J. (1997). Directed signatures and application to threshold cryptosystems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1189, pp. 131–138). Springer Verlag. https://doi.org/10.1007/3-540-62494-5_13
Mendeley helps you to discover research relevant for your work.