Verifiable threshold signature schemes against conspiracy attack

被引:0
|
作者
Gan Yuan-ju
机构
[1] Central South University,College of Information Science and Engineering
来源
关键词
Cryptography; Threshold group signature; Conspiracy attack; Forgery attack; A; TP309;
D O I
10.1631/BF02839312
中图分类号
学科分类号
摘要
In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: (1) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Sccurity: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters, such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.
引用
收藏
页码:50 / 54
页数:4
相关论文
共 50 条
  • [1] Verifiable threshold signature schemes against conspiracy attack
    甘元驹
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2004, (01) : 51 - 55
  • [2] A (t, n) threshold signature scheme against conspiracy attack
    Zheng, Minghui
    Zhu, Jianhua
    Cui, Guohua
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1218 - 1221
  • [3] Threshold signature scheme resistible for conspiracy attack
    Chung, Yu Fang
    Liu, Chia-Hui
    Lai, Feipei
    Chen, Tzer-Shyong
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2006, : 479 - +
  • [4] An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Chen, Tzer-Long
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 3027 - 3032
  • [5] Multivariate Threshold Group Signature Scheme Withstanding Conspiracy Attack
    Tao, Yu
    Yang, Yatao
    Li, Zichen
    Zheng, Xin
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 114 - 118
  • [6] Anti-conspiracy attack threshold signature model and protocol
    Wang, Xiaoping
    Ning, Zhenhu
    Wang, Wei
    Yang, Yongli
    [J]. International Journal of Wireless and Mobile Computing, 2019, 17 (03) : 300 - 306
  • [7] A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack
    XIE Qi 1
    2.School of Information and Engineering
    3.Hangzhou Teachers College
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 107 - 110
  • [8] A Verifiable (t, n) Threshold Quantum State Sharing Against Denial Attack
    Song, Xiuli
    Liu, Yanbing
    Xiao, Min
    Deng, Hongyao
    [J]. IEEE ACCESS, 2019, 7 : 98908 - 98920
  • [9] Threshold proxy signature schemes
    Kan, Z
    [J]. INFORMATION SECURITY, 1998, 1396 : 282 - 290
  • [10] Publicly verifiable fully distributed proxy signature schemes
    Xia Jian-guo
    Liu Yuan
    Ma Chuan-gui
    [J]. Proceedings of 2005 Chinese Control and Decision Conference, Vols 1 and 2, 2005, : 1261 - 1264