A Secure Multi-party Signature Scheme Based on Trust Mechanism

被引:0
|
作者
Cheng, Yage [1 ]
Hu, Mingsheng [1 ]
Wang, Lipeng [1 ]
Lei, Yanfang [1 ]
Fu, Junjun [1 ]
Gong, Bei [2 ]
Ma, Wei [1 ]
机构
[1] Zhengzhou Normal Univ, Zhengzhou 450044, Peoples R China
[2] Beijing Univ Technol, Beijing 100124, Peoples R China
关键词
Secure multi-party computation; Trusted mechanism; Trust matrix; Secret sharing; Threshold signature;
D O I
10.1007/978-981-15-3418-8_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming at the problem of trust, we propose a secure multi-party signature scheme based on trust mechanism. In this scheme, we introduce a trust vector with time-stamped and form a trust matrix composed of multidimensional vectors to record the behavior of the participants periodically. Finally, a trusted evaluation mechanism is established for the participants. Under the premise of participant trustworthiness, a secure multi-party dynamic threshold signature scheme is constructed by secret sharing technology. The security analysis shows that the scheme can effectively suppress the vandalism of malicious participants. it is forward security and can resist mobile attacks. Performance analysis shows that the scheme has lower computational complexity and higher execution efficiency.
引用
下载
收藏
页码:119 / 132
页数:14
相关论文
共 50 条
  • [31] Securing of Clouds Based on Lightweight Secure Multi-party Computation
    Takahashi, Kouta
    Sato, Fumiaki
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 452 - 464
  • [32] Quantum secure multi-party summation based on entanglement swapping
    Yongli Wang
    Peichu Hu
    Qiuliang Xu
    Quantum Information Processing, 2021, 20
  • [33] An aggregate signature based multi-party contract signing protocol
    Sun, Yan-Bin
    Gu, Li-Ze
    Zheng, Shi-Hui
    Yang, Yi-Xian
    Sun, Yan
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2011, 34 (02): : 8 - 11
  • [34] A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things
    Liu, Jinhui
    Wen, Jiaming
    Zhang, Bowen
    Dong, Shunyu
    Tang, Bo
    Yu, Yong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 141 : 663 - 676
  • [35] Multi-party Quantum Secure Direct Communication
    Tan, Xiaoqing
    Zhang, Xiaoqian
    Liang, Cui
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 251 - 255
  • [36] Information theory and secure multi-party computation
    Maurer, UM
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [37] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [38] SECURE MULTI-PARTY CONSENSUS GOSSIP ALGORITHMS
    Lazzeretti, Riccardo
    Horn, Steven
    Braca, Paolo
    Willett, Peter
    2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [39] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [40] Secure multi-party computation made simple
    Maurer, U
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381