Threshold identification

Chi Sung Laih, Chin Hsing Chen

Research output: Contribution to journalConference article


The authors propose a threshold identification scheme based on the El Gamal signature scheme and the Schnorr identification scheme. The proposed scheme is secure under the assumption that computing the discrete logarithm is infeasible. When the threshold value of a group is chosen as one, the threshold identification is a member authentication scheme.

Original languageEnglish
Pages (from-to)73-76
Number of pages4
JournalUniversity of Kentucky, Office of Engineering Services, (Bulletin) UKY BU
Publication statusPublished - 1992 Mar 1
EventProceedings 25th Annual 1991 IEEE International Carnahan Conference on Security Technology - Taipei, Taiwan
Duration: 1991 Oct 11991 Oct 3

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'Threshold identification'. Together they form a unique fingerprint.

  • Cite this