An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack

被引:0
|
作者
Chung, Yu-Fang [1 ]
Chen, Tzer-Shyong [2 ]
Chen, Tzer-Long [3 ]
机构
[1] Tunghai Univ, Dept Elect Engn, Taichung, Taiwan
[2] Tunghai Univ, Dept Informat Mangement, Taichung, Taiwan
[3] Lingtung Univ, Dept Technol Prod Design, Taichung, Taiwan
来源
关键词
Threshold Signature; Digital Signature; Public Key; Discrete Logarithm Problem; TRACEABLE SIGNERS; CRYPTOSYSTEMS;
D O I
10.12785/amis/080642
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The study presents a threshold signature scheme. While developing threshold cryptography, the concept of threshold signature can accomplish a tradeoff between efficiency in use and dependability of security. The presented threshold signature scheme can resist conspiracy attack by controlling the right of issuing group signature, and the performance of constructing group signature is also enhanced by simplifying keys.
引用
收藏
页码:3027 / 3032
页数:6
相关论文
共 50 条
  • [1] Threshold signature scheme resistible for conspiracy attack
    Chung, Yu Fang
    Liu, Chia-Hui
    Lai, Feipei
    Chen, Tzer-Shyong
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 479 - +
  • [2] A (t, n) threshold signature scheme against conspiracy attack
    Zheng, Minghui
    Zhu, Jianhua
    Cui, Guohua
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1218 - 1221
  • [3] Multivariate Threshold Group Signature Scheme Withstanding Conspiracy Attack
    Tao, Yu
    Yang, Yatao
    Li, Zichen
    Zheng, Xin
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 114 - 118
  • [4] A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack
    XIE Qi 1
    2.School of Information and Engineering
    3.Hangzhou Teachers College
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 107 - 110
  • [5] Verifiable threshold signature schemes against conspiracy attack
    甘元驹
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2004, (01) : 51 - 55
  • [6] Verifiable threshold signature schemes against conspiracy attack
    Gan Yuan-ju
    [J]. Journal of Zhejiang University-SCIENCE A, 2004, 5 (1): : 50 - 54
  • [7] An Efficient Threshold Signature Scheme
    Zhang Chengli
    Tang Chunming
    [J]. 2011 SECOND ETP/IITA CONFERENCE ON TELECOMMUNICATION AND INFORMATION (TEIN 2011), VOL 1, 2011, : 85 - 87
  • [8] Anti-conspiracy attack threshold signature model and protocol
    Wang, Xiaoping
    Ning, Zhenhu
    Wang, Wei
    Yang, Yongli
    [J]. International Journal of Wireless and Mobile Computing, 2019, 17 (03) : 300 - 306
  • [9] Efficient Threshold Signature Scheme
    Aboud, Sattar J.
    AL-Fayoumi, Mohammad
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (01) : 112 - 116
  • [10] An efficient threshold group signature scheme
    Hu, Chengyu
    Li, Daxing
    [J]. IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 338 - +