A Secure Multi-party Signature Scheme Based on Trust Mechanism

被引:0
|
作者
Cheng, Yage [1 ]
Hu, Mingsheng [1 ]
Wang, Lipeng [1 ]
Lei, Yanfang [1 ]
Fu, Junjun [1 ]
Gong, Bei [2 ]
Ma, Wei [1 ]
机构
[1] Zhengzhou Normal Univ, Zhengzhou 450044, Peoples R China
[2] Beijing Univ Technol, Beijing 100124, Peoples R China
关键词
Secure multi-party computation; Trusted mechanism; Trust matrix; Secret sharing; Threshold signature;
D O I
10.1007/978-981-15-3418-8_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming at the problem of trust, we propose a secure multi-party signature scheme based on trust mechanism. In this scheme, we introduce a trust vector with time-stamped and form a trust matrix composed of multidimensional vectors to record the behavior of the participants periodically. Finally, a trusted evaluation mechanism is established for the participants. Under the premise of participant trustworthiness, a secure multi-party dynamic threshold signature scheme is constructed by secret sharing technology. The security analysis shows that the scheme can effectively suppress the vandalism of malicious participants. it is forward security and can resist mobile attacks. Performance analysis shows that the scheme has lower computational complexity and higher execution efficiency.
引用
下载
收藏
页码:119 / 132
页数:14
相关论文
共 50 条
  • [41] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [42] Quantum protocols for secure multi-party summation
    Ji, ZhaoXu
    Zhang, HuanGuo
    Wang, HouZhen
    Wu, FuSheng
    Jia, JianWei
    Wu, WanQing
    QUANTUM INFORMATION PROCESSING, 2019, 18 (06)
  • [43] A study of secure multi-party ranking problem
    Liu, Wen
    Luo, Shou-Shan
    Chen, Ping
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 727 - +
  • [44] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    Journal of Cryptology, 2005, 18 : 247 - 287
  • [45] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [46] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    Distributed Computing, 2017, 30 : 193 - 229
  • [47] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [48] SecureGBM: Secure Multi-Party Gradient Boosting
    Feng, Zhi
    Xiong, Haoyi
    Song, Chuanyuan
    Yang, Sijia
    Zhao, Baoxin
    Wang, Licheng
    Chen, Zeyu
    Yang, Shengwen
    Liu, Liping
    Huan, Jun
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 1312 - 1321
  • [49] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266
  • [50] Secure Multi-party Comparison Protocol and Application
    Zhang, Jing
    Luo, Shoushan
    Yang, Yixian
    DATA SCIENCE, PT 1, 2017, 727 : 292 - 304