Threshold signature scheme resistible for conspiracy attack

被引:0
|
作者
Chung, Yu Fang [1 ]
Liu, Chia-Hui [2 ]
Lai, Feipei [1 ,3 ]
Chen, Tzer-Shyong [2 ]
机构
[1] Natl Taiwan Univ, Dept Elect Engn, Taipei, Taiwan
[2] Tunghai Univ, Informat Management Dept, Taichung, Taiwan
[3] Natl Taiwan Univ, Comp Sci & Informat Engn Dept, Taipei, Taiwan
关键词
threshold signature; threshold cryptography; conspiracy attack; and group signature;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Threshold signature is an important aspect Of threshold cryptography, and represents almost the core of threshold cryptography research. Based on the threshold signature method, this work was made for resisting conspiracy attack by controlling the group signature issuance rights. The proposed method suffers a flaw for it requires establishing a secretary for signature issuance. By the way, the proposed strategy can be widely applied to various group signature cryptosystems, in which the participant conspirators disable to forge the group signature.
引用
收藏
页码:479 / +
页数:2
相关论文
共 50 条
  • [1] An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Chen, Tzer-Long
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3027 - 3032
  • [2] A (t, n) threshold signature scheme against conspiracy attack
    Zheng, Minghui
    Zhu, Jianhua
    Cui, Guohua
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1218 - 1221
  • [3] Multivariate Threshold Group Signature Scheme Withstanding Conspiracy Attack
    Tao, Yu
    Yang, Yatao
    Li, Zichen
    Zheng, Xin
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 114 - 118
  • [4] A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack
    XIE Qi 1
    2.School of Information and Engineering
    3.Hangzhou Teachers College
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 107 - 110
  • [5] Verifiable threshold signature schemes against conspiracy attack
    甘元驹
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2004, (01) : 51 - 55
  • [6] Verifiable threshold signature schemes against conspiracy attack
    Gan Yuan-ju
    [J]. Journal of Zhejiang University-SCIENCE A, 2004, 5 (1): : 50 - 54
  • [7] Anti-conspiracy attack threshold signature model and protocol
    Wang, Xiaoping
    Ning, Zhenhu
    Wang, Wei
    Yang, Yongli
    [J]. International Journal of Wireless and Mobile Computing, 2019, 17 (03) : 300 - 306
  • [8] Obfuscated RSUs Vector Based Signature Scheme for Detecting Conspiracy Sybil Attack in VANETs
    Feng, Xia
    Tang, Jin
    [J]. MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [9] An Anonymous Authentication Scheme Withstanding the Conspiracy Attack
    YIN Fengmei
    PU Guangning
    [J]. Wuhan University Journal of Natural Sciences, 2016, 21 (05) : 415 - 420
  • [10] Attack on a concast signature scheme
    Stinson, DR
    [J]. INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 39 - 41