An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack

被引:0
|
作者
Chung, Yu-Fang [1 ]
Chen, Tzer-Shyong [2 ]
Chen, Tzer-Long [3 ]
机构
[1] Tunghai Univ, Dept Elect Engn, Taichung, Taiwan
[2] Tunghai Univ, Dept Informat Mangement, Taichung, Taiwan
[3] Lingtung Univ, Dept Technol Prod Design, Taichung, Taiwan
来源
关键词
Threshold Signature; Digital Signature; Public Key; Discrete Logarithm Problem; TRACEABLE SIGNERS; CRYPTOSYSTEMS;
D O I
10.12785/amis/080642
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The study presents a threshold signature scheme. While developing threshold cryptography, the concept of threshold signature can accomplish a tradeoff between efficiency in use and dependability of security. The presented threshold signature scheme can resist conspiracy attack by controlling the right of issuing group signature, and the performance of constructing group signature is also enhanced by simplifying keys.
引用
收藏
页码:3027 / 3032
页数:6
相关论文
共 50 条
  • [41] Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem
    夏祥胜
    洪帆
    耿永军
    崔国华
    [J]. Railway Engineering Science, 2008, (01) : 18 - 23
  • [42] More Efficient Threshold Signature Scheme in Gap Diffie-Hellman Group
    Nyang, DaeHun
    Yamamura, Akihiro
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (07) : 1720 - 1723
  • [43] Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    Yousef, Sufian
    Cole, Mike
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153
  • [44] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [45] Threshold Signature Scheme with Subliminal Channel
    Zhou, Xuanwu
    Wei, Ping
    [J]. CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 1443 - 1447
  • [46] Analysis on a threshold digital signature scheme
    Deng, Suping
    Xu, Qiuliang
    [J]. 2002, Shanghai Computer Society (28):
  • [47] Improvement of a threshold proxy signature scheme
    Li, Ji-Guo
    Cao, Zhen-Fu
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (11):
  • [48] A SECURE THRESHOLD GROUP SIGNATURE SCHEME
    Wang Xiaoming Fu Fangwei(School of Mathematics Science
    [J]. Journal of Electronics(China), 2003, (04) : 274 - 278
  • [49] Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation
    Du, Rong
    Zhao, Chenglin
    Li, Shenghong
    Li, Jian
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2014,
  • [50] On/Off Threshold Group Signature Scheme
    Wang Xiaoming
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 69 - 73