The authors propose a threshold identification scheme based on the El Gamal signature scheme and the Schnorr identification scheme. The proposed scheme is secure under the assumption that computing the discrete logarithm is infeasible. When the threshold value of a group is chosen as one, the threshold identification is a member authentication scheme.
|Number of pages||4|
|Journal||University of Kentucky, Office of Engineering Services, (Bulletin) UKY BU|
|Publication status||Published - 1992 Mar 1|
|Event||Proceedings 25th Annual 1991 IEEE International Carnahan Conference on Security Technology - Taipei, Taiwan|
Duration: 1991 Oct 1 → 1991 Oct 3
All Science Journal Classification (ASJC) codes