An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack

被引:0
|
作者
Chung, Yu-Fang [1 ]
Chen, Tzer-Shyong [2 ]
Chen, Tzer-Long [3 ]
机构
[1] Tunghai Univ, Dept Elect Engn, Taichung, Taiwan
[2] Tunghai Univ, Dept Informat Mangement, Taichung, Taiwan
[3] Lingtung Univ, Dept Technol Prod Design, Taichung, Taiwan
来源
关键词
Threshold Signature; Digital Signature; Public Key; Discrete Logarithm Problem; TRACEABLE SIGNERS; CRYPTOSYSTEMS;
D O I
10.12785/amis/080642
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The study presents a threshold signature scheme. While developing threshold cryptography, the concept of threshold signature can accomplish a tradeoff between efficiency in use and dependability of security. The presented threshold signature scheme can resist conspiracy attack by controlling the right of issuing group signature, and the performance of constructing group signature is also enhanced by simplifying keys.
引用
收藏
页码:3027 / 3032
页数:6
相关论文
共 50 条
  • [31] A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
    Melchor, Carlos Aguilar
    Cayrel, Pierre-Louis
    Gaborit, Philippe
    Laguillaumie, Fabien
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (07) : 4833 - 4842
  • [32] FrostOracle: A Novel and Efficient Blockchain Oracle Scheme Based on Threshold Signature
    Chen, Xi
    Li, Fang
    Yang, Wenwu
    Chen, Ting
    [J]. 2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS, 2024, : 781 - 786
  • [33] A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
    Melchor, Carlos Aguilar
    Cayrel, Pierre-Louis
    Gaborit, Philippe
    [J]. POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 1 - 16
  • [34] Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
    Yu, Yong
    Mu, Yi
    Susilo, Willy
    Au, Man Ho
    [J]. INFORMATION PROCESSING LETTERS, 2014, 114 (1-2) : 5 - 8
  • [35] A threshold GQ signature scheme
    Liu, LS
    Chu, CK
    Tzeng, WG
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 137 - 150
  • [36] Quantum Signature Scheme for Participant Attack
    Won, Kitak
    Heo, Jino
    Yoon, Chun Seok
    Choi, Ji-Woong
    Yang, Hyung-Jin
    [J]. JOURNAL OF THE KOREAN PHYSICAL SOCIETY, 2019, 75 (04) : 271 - 276
  • [37] Forgery attack to a group signature scheme
    Li, Yan-Jun
    Wu, Yu-Hua
    Li, Meng-Dong
    Yang, Gang
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (07): : 1772 - 1774
  • [38] Quantum Signature Scheme for Participant Attack
    Kitak Won
    Jino Heo
    Chun Seok Yoon
    Ji-Woong Choi
    Hyung-Jin Yang
    [J]. Journal of the Korean Physical Society, 2019, 75 : 271 - 276
  • [39] A New Efficient On-line/Off-line Threshold Signature Scheme
    Wu Chunhui
    Chen Xiaofeng
    Long Dongyang
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (02) : 321 - 324
  • [40] An efficient and practical (t, n) threshold proxy signature scheme with known signers
    Huang, HF
    Chang, CC
    [J]. FUNDAMENTA INFORMATICAE, 2003, 56 (03) : 243 - 253