Olivier Delos - Academia.edu (original) (raw)
Papers by Olivier Delos
ISSE 2005 — Securing Electronic Business Processes, 2005
Lecture Notes in Computer Science, 1994
Sharing signature power may be required in many occasions. Moreover a multisigning operation may ... more Sharing signature power may be required in many occasions. Moreover a multisigning operation may be required to be performed simultaneously (in some sense) by all the involved cosigning parties. We describe a complete cooperation-based signature scheme achieving such requirements. It is based on mental games and in particular on the Guillou-Quisquater zero-knowledge scheme. In our scheme, the cosigners interact with an intermediate entity, the combiner, to produce a multisignature. Only one interactive exchange is required. The scheme is practical and secure. A cheating combiner can only prevent the operation from happening but it will be immediately detected. No impersonation, substitution, or coalition attacks are possible.
Lecture Notes in Computer Science, 1994
ISSE 2011 Securing Electronic Business Processes, 2011
ISSE 2005 — Securing Electronic Business Processes, 2005
Lecture Notes in Computer Science, 1994
Sharing signature power may be required in many occasions. Moreover a multisigning operation may ... more Sharing signature power may be required in many occasions. Moreover a multisigning operation may be required to be performed simultaneously (in some sense) by all the involved cosigning parties. We describe a complete cooperation-based signature scheme achieving such requirements. It is based on mental games and in particular on the Guillou-Quisquater zero-knowledge scheme. In our scheme, the cosigners interact with an intermediate entity, the combiner, to produce a multisignature. Only one interactive exchange is required. The scheme is practical and secure. A cheating combiner can only prevent the operation from happening but it will be immediately detected. No impersonation, substitution, or coalition attacks are possible.
Lecture Notes in Computer Science, 1994
ISSE 2011 Securing Electronic Business Processes, 2011