Chris J. Mitchell, Borselius, N. and Wilson, A. (2002) On the value of threshold signatures. ACM SIGOPS Operating Systems Review, 36 (4).
Full text access: Open
Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4]. The purpose of this paper is to present a rather simple alternative to threshold signatures which raises questions about the value of such schemes, at least when applied to the mobile agent scenario.
This is a Published version This version's date is: 10/2002 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/0a2cff14-4d1f-a81c-976c-1b66bb740cd8/1/
Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010
This is the final draft version of the paper that appeared in the journal 'ACM SIGOPS Operating Systems Review', 36(4), 2002.
1 Niklas Borselius , Chris J. Mitchell , Aaron Wilson, On Mobile Agent Based Transactions in Moderately Hostile Environments, Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security, p.173-186, November 26-27, 2001 2 Niklas Borselius , Chris J. Mitchell , Aaron Wilson, A pragmatic alternative to undetachable signatures, ACM SIGOPS Operating Systems Review, v.36 n.2, p.6-11, April 2002 [doi>10.1145/509526.509529] 3 Bruno Crispo, Delegation of Responsibility (Position Paper), Proceedings of the 6th International Workshop on Security Protocols, p.118-124, April 15-17, 1998 4 Yvo Desmedt, Society and Group Oriented Cryptography: A New Concept, A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, p.120-127, August 16-20, 1987 5 V. Shoup. Practical threshold signatures. In B. Preneel, editor, Advances in Cryptology --- EUROCRYPT 2000, number 1807 in Lecture Notes in Computer Science, pages 207-220. Springer-Verlag, Berlin, 2000. 6 V. Varadharajan, P. Allen, and S. Black. An analysis of the proxy problem in distributed systems. In Proceedings: 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pages 255-275. IEEE Computer Society Press, Los Alamitos, California, May 1991.