Anti-conspiracy attack threshold signature model and protocol

被引:0
|
作者
Wang, Xiaoping [1 ,2 ]
Ning, Zhenhu [1 ,2 ]
Wang, Wei [1 ,2 ]
Yang, Yongli [1 ,2 ]
机构
[1] Faculty of Information Technology, Beijing University of Technology, Beijing,100124, China
[2] Beijing Key Laboratory of Trusted Computing, Beijing, China
关键词
D O I
10.1504/IJWMC.2019.102256
中图分类号
学科分类号
摘要
引用
收藏
页码:300 / 306
相关论文
共 50 条
  • [1] Threshold signature scheme resistible for conspiracy attack
    Chung, Yu Fang
    Liu, Chia-Hui
    Lai, Feipei
    Chen, Tzer-Shyong
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 479 - +
  • [2] Verifiable threshold signature schemes against conspiracy attack
    甘元驹
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2004, (01) : 51 - 55
  • [3] An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Chen, Tzer-Long
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3027 - 3032
  • [4] Verifiable threshold signature schemes against conspiracy attack
    Gan Yuan-ju
    [J]. Journal of Zhejiang University-SCIENCE A, 2004, 5 (1): : 50 - 54
  • [5] Multivariate Threshold Group Signature Scheme Withstanding Conspiracy Attack
    Tao, Yu
    Yang, Yatao
    Li, Zichen
    Zheng, Xin
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 114 - 118
  • [6] A (t, n) threshold signature scheme against conspiracy attack
    Zheng, Minghui
    Zhu, Jianhua
    Cui, Guohua
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1218 - 1221
  • [7] A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack
    XIE Qi 1
    2.School of Information and Engineering
    3.Hangzhou Teachers College
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 107 - 110
  • [8] A Rational Threshold Signature Model and Protocol Based on Different Permissions
    Wang, Bojun
    Cai, Cheng
    Zhou, Quan
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [9] Media Exposure to Conspiracy vs. Anti-conspiracy Information. Effects on the Willingness to Accept a COVID-19 Vaccine
    Buturoiu, Raluca
    Udrea, Georgiana
    Dumitrache, Alexandru Cristian
    Corbu, Nicoleta
    [J]. CENTRAL EUROPEAN JOURNAL OF COMMUNICATION, 2021, 14 (02): : 237 - 258
  • [10] Sub-signature verification protocol in threshold signature
    [J]. 2005, Shanghai Computer Society, Shanghai, China (31):