• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
CAI Yong-quan, CHENG Fu-lai. Threshold Signature Scheme Based on Factorial Decompose Theorem of Polynomial[J]. Journal of Beijing University of Technology, 2012, 38(5): 727-729. DOI: 10.3969/j.issn.0254-0037.2012.05.017
Citation: CAI Yong-quan, CHENG Fu-lai. Threshold Signature Scheme Based on Factorial Decompose Theorem of Polynomial[J]. Journal of Beijing University of Technology, 2012, 38(5): 727-729. DOI: 10.3969/j.issn.0254-0037.2012.05.017

Threshold Signature Scheme Based on Factorial Decompose Theorem of Polynomial

More Information
  • Received Date: June 08, 2010
  • Available Online: December 02, 2022
  • To get the ability of anti-collusion attacks,a threshold signature scheme based on the factorial decompose theorem of polynomial is proposed without the secret sharing scheme.The correctness of the scheme is proved.According to the security analysis,not only can the scheme resist the collusion attack but also it has other good features including resisting forgery attacks and traceability.
  • [1]
    DESMEDT Y,FRANKEL Y.Shared generation ofauthenticators and signatures[C]∥Advances inCryptology-Crypto'91 Proceedings.Berlin:Springer-Verlag,1992:457-469.
    [2]
    WANG C T,LIN C H,CHANG C C.Threshold signatureschemes with traceable signers in group communications[J].Computer Communications,1998,21(8):771-776.
    [3]
    XU Q L.A modified threshold RSA digital signaturescheme[J].Chinese Journal of Computers,2000,23(5):449-453.
    [4]
    LI C M,HWANG T,LEE N Y.Remark on the thresholdRSA signature scheme[C]∥Advances in Cryptology-Crypto'93 Proceedings.Berlin:Springer-Verlag,1994:413-420.
    [5]
    王斌,李建华.无可信中心的(t,n)限签名方案[J].计算机学报,2003,26(11):1581-1584.WANG Bin,LI Jian-hua.(t,n)threshold signaturescheme without a trusted party[J].Chinese Journal ofComputers,2003,26(11):1581-1584.(in Chinese)
    [6]
    XIE Qi,YU Xiu-yuan.A new(t,n)threshold signaturescheme withstanding the conspiracy attack[J].WuhanUniversity Journal of Natural Sciences,2005,10(1):107-110.
    [7]
    张文芳,王小敏,何大可.一个无可信中心(t,n)门限签名方案的安全缺陷及其改进[J].铁道学报,2008,30(3):40-45.ZHANG Wen-fang,WANG Xiao-min,HE Da-ke.Securityanalysis of the(t,n)threshold signature scheme without atrusted party and its improvement[J].Journal of the ChinaRailway Society,2008,30(3):40-45.(in Chinese)
    [8]
    张兴兰.一种基于有限域上的多项式分解定理的群签名方案[J].微电子学与计算机,2010,27(3):163-166.ZHANG Xing-lan.An efficient group signature schemebased on factorial decompose theorem of polynomial withfactors in finite field[J].Microelectronics&Computer,2010,27(3):163-166.(in Chinese)

Catalog

    Article views PDF downloads Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return