Multivariate Threshold Group Signature Scheme Withstanding Conspiracy Attack

被引:0
|
作者
Tao, Yu [1 ]
Yang, Yatao [2 ]
Li, Zichen
Zheng, Xin [1 ,2 ]
机构
[1] Xidian Univ, Commun Engn Inst, Xian 710071, Shanxi, Peoples R China
[2] Beijing Electron Sci & Technol Inst, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
Multivariate; Threshold group signature; Conspiracy attack; Forgery attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threshold signature has important significance. However, the security and impeccable threshold group signature schemes are rarely. In this paper, a multivariate threshold group signature scheme is proposed. After the analysis, a conspiracy attack scheme which could offer forgery attacks to the signature system has been proposed. Then, the paper gives a new matrix multiplication definition and prime matrix concept, so the conspiracy attack immune group signature scheme is achieved. Analysis shows that the scheme not only can fundamentally withstand conspiracy and forgery attacks but the identity of signature members can be traced anonymously as well. Meanwhile, it can realize the unknown ability of group signature secret key by constructing a secure distributed key generation protocol, so the threshold group signature security is greatly enhanced.
引用
收藏
页码:114 / 118
页数:5
相关论文
共 50 条
  • [1] A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack
    XIE Qi 1
    2.School of Information and Engineering
    3.Hangzhou Teachers College
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 107 - 110
  • [2] Threshold signature scheme resistible for conspiracy attack
    Chung, Yu Fang
    Liu, Chia-Hui
    Lai, Feipei
    Chen, Tzer-Shyong
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 479 - +
  • [3] An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Chen, Tzer-Long
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3027 - 3032
  • [4] An Anonymous Authentication Scheme Withstanding the Conspiracy Attack
    YIN Fengmei
    PU Guangning
    [J]. Wuhan University Journal of Natural Sciences, 2016, 21 (05) : 415 - 420
  • [5] A (t, n) threshold signature scheme against conspiracy attack
    Zheng, Minghui
    Zhu, Jianhua
    Cui, Guohua
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1218 - 1221
  • [6] Verifiable threshold signature schemes against conspiracy attack
    甘元驹
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2004, (01) : 51 - 55
  • [7] Verifiable threshold signature schemes against conspiracy attack
    Gan Yuan-ju
    [J]. Journal of Zhejiang University-SCIENCE A, 2004, 5 (1): : 50 - 54
  • [8] Anti-conspiracy attack threshold signature model and protocol
    Wang, Xiaoping
    Ning, Zhenhu
    Wang, Wei
    Yang, Yongli
    [J]. International Journal of Wireless and Mobile Computing, 2019, 17 (03) : 300 - 306
  • [9] A multivariate based threshold ring signature scheme
    Petzoldt, Albrecht
    Bulygin, Stanislav
    Buchmann, Johannes
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2013, 24 (3-4) : 255 - 275
  • [10] An efficient multivariate threshold ring signature scheme
    Duong, Dung H.
    Tran, Ha T. N.
    Susilo, Willy
    Le Van Luyen
    [J]. COMPUTER STANDARDS & INTERFACES, 2021, 74