A signature with shared verification scheme
This paper presents a signature scheme for a single user or a group of users. The shared verification of such a signature uses the principle of threshold schemes. The constructions are based on a special class of finite incidence struc- tures, so called generalised quadrangles.
- B. Bagchi and N. S. Sastry, Intersection pattern of the classical ovoids in symplectic 3-space of even order, Preprint.Google Scholar
- M. De Soete and K. Vedder, Some new classes of geometric threshold schemes, Proceedings of Eurocrypt’ 88, ed. G. Günther, L.N.C.S. 330 (1988), Springer Verlag, 389–401.Google Scholar
- G. J. Simmons, A Natural Taxonomy for Digital Information Authentication Schemes, Proceedings of Crypto’ 87, ed. C. Pomerance, L.N.C.S. 293 (1988), Springer Verlag, 269–288.Google Scholar
- G. J. Simmons, How to really share a secret, Proceedings of Crypto’ 88, L.N.C.S., Springer Verlag, to appear.Google Scholar
- G. J. Simmons, Shared Secret and / or Shared Control Schemes, Eurocrypt’ 89 Houthalen (Belgium), April 10–13, extended abstract.Google Scholar
- S. E. Payne and J. A. Thas, Finite generalised quadrangles, Research Notes in Math. #110, Pitman Publ. Inc., 1984.Google Scholar