• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
CAI Yong-quan, ZHANG En, HE Jing-yang. (t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J]. Journal of Beijing University of Technology, 2011, 37(8): 1231-1235.
Citation: CAI Yong-quan, ZHANG En, HE Jing-yang. (t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J]. Journal of Beijing University of Technology, 2011, 37(8): 1231-1235.

(t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack

More Information
  • Received Date: September 04, 2009
  • Available Online: November 18, 2022
  • In order to overcome the security defect of the existing threshold signature scheme,a threshold signature scheme withstanding the conspiracy attack is proposed.Analysis shows that this scheme can not only resist conspiracy attacks essentially,but also provide anonymity and traceability simultaneously.In addition,a conspiracy attack is designed in this paper,which is adopted to test the current schemes and the scheme presented.The result shows that current schemes can not ensure the signature security,however,the proposed scheme can cope with this attack effectively.
  • [1]
    DESMEDTY,FRANKEL Y.Shared generation of authentications and signature[C]∥Proc of Advances in Cryptology-Crypto 91.Berlin:Springer-Verlag,1991:457-469.
    [2]
    SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
    [3]
    LI Chuan-ming,HWANG T,LEE N Y.Remark on the threshold RSA signature scheme[C]∥Proc of Advances inCryptology-Crypto 93.Berlin:Springer-Verlag,1994:413-420.
    [4]
    HARN L.Group-oriented(t,n)threshold signature scheme and digital multi-signature[J].IEE Proceedings of Computersand Digital Technique,1994,141(5):307-313.
    [5]
    ELGAMAL T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Transaction onInformation Theory,1985,IT-31(4):469-472.
    [6]
    AGNEW G B,MULIN R C,van STONE S A.Improved digital signature scheme based on discrete exponentiation[J].Electronics Letters,1990,26(14):1024-1025.
    [7]
    王斌,李建华.无可信中心的(t,n)门限签名方案[J].计算机学报,2003,26(11):1581-1584.WANG Bin,LI Jian-hua.(t,n)threshold signature scheme without a trusted party[J].Chinese Journal of Computers,2003,26(11):1581-1584.(in Chinese)
    [8]
    XIE Qi,YU Xiu-yuan.A new(t,n)threshold signature scheme withstanding the conspiracy attack[J].Wuhan UniversityJournal of Natural Sciences,2005,10(1):107-110.
    [9]
    张文芳,何大可,王宏霞,等.具有可追查性的抗合谋攻击(t,n)门限签名方案[J].西南交通大学学报,2007,42(4):461-467.ZHANG Wen-fang,HE Da-ke,WANG Hong-xia,et al.Conspiracy attack immune(t,n)threshold signature scheme withtraceability[J].Journal of Southwest Jiaotong University,2007,42(4):461-467.(in Chinese)
    [10]
    POHLIG S C,HELLMAN M.An improved algorithm for computing logarithms over GF(p)and its cryptographic significance[J].IEEE Transaction on Information Theory,1978,IT-24(1):106-110.

Catalog

    Article views (33) PDF downloads (10) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return