An efficient group-oriented (t,n) threshold signature scheme with message linkage

被引:0
|
作者
Perng, C.-Y. [1 ]
Jan, J.-K. [1 ]
Tseng, Y.-M. [1 ]
机构
[1] Institute of Applied Mathematics, National Chung Hsing University, Taichung 402, Taiwan
来源
| 2001年 / Chinese Institute of Engineers卷 / 24期
关键词
Cryptography - Data communication systems - Security of data;
D O I
暂无
中图分类号
学科分类号
摘要
In 1999, Chen (1999) proposed several signature schemes in his graduate thesis. One is a group-oriented (t,n) threshold signature scheme in which the (t,n) threshold signature is based on an RSA scheme. Although it has advantages, including message recovery, lower cost for transmission, and message linkage, it requires a great amount of time for the modulo exponentiation computation. In this article, we propose an improved scheme, which is more efficient than the one proposed by Chen both in the signature generation and the verification.
引用
收藏
相关论文
共 50 条
  • [31] ACloud computing security schemes:- TGOS [Threshold Group-Oriented signature] and TMS [Threshold multisignature schemes]
    Deshmukh, Aaradhana A.
    Mihovska, Albena
    Prasad, Ramjee
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 203 - 208
  • [32] Secure (T,N) threshold signature scheme
    Wang, Bin
    Pan, Hao-Dong
    Li, Jian-Hua
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2002, 36 (09): : 1333 - 1336
  • [33] (t, n) Threshold group signature scheme based on elliptic curve cryptosystem
    School of Electr. and Inf. Eng., Dalian Univ. of Technol., Dalian 116024, China
    Dalian Ligong Daxue Xuebao, 2007, 3 (429-432):
  • [34] A division-of-labor-signature (t, n) threshold-authenticated encryption scheme with message linkage based on the elliptic curve cryptosystem
    Chen, TS
    Huang, KH
    Chung, YF
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 106 - 112
  • [35] An efficient and practical (t, n) threshold proxy signature scheme with known signers
    Huang, HF
    Chang, CC
    FUNDAMENTA INFORMATICAE, 2003, 56 (03) : 243 - 253
  • [36] A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size Signatures
    Lin, Han-Yu
    Ting, Pei-Yih
    Wu, Hong-Ru
    Lee, Po-Ting
    PROCEEDINGS OF 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY (ICCET 2019), 2019, : 6 - 10
  • [37] A hierarchical and dynamic group-oriented cryptographic scheme
    Wang, SJ
    Chang, JF
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (01) : 76 - 85
  • [38] Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management
    Jiao, Dong
    Li, Mingchu
    Ou, Jinping
    Guo, Cheng
    Ren, Yizhi
    Cui, Yongrui
    IET INFORMATION SECURITY, 2013, 7 (04) : 343 - 348
  • [39] Cryptanalysis of some group-oriented proxy signature schemes
    Park, JH
    Kang, BG
    Park, S
    INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 10 - 24
  • [40] Group-oriented undeniable signature schemes with a trusted center
    Lee, NY
    Hwang, T
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 730 - 734