Citation: | CAI Yong-quan, ZHANG En, HE Jing-yang. (t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J]. Journal of Beijing University of Technology, 2011, 37(8): 1231-1235. |
[1] |
DESMEDTY,FRANKEL Y.Shared generation of authentications and signature[C]∥Proc of Advances in Cryptology-Crypto 91.Berlin:Springer-Verlag,1991:457-469.
|
[2] |
SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
|
[3] |
LI Chuan-ming,HWANG T,LEE N Y.Remark on the threshold RSA signature scheme[C]∥Proc of Advances inCryptology-Crypto 93.Berlin:Springer-Verlag,1994:413-420.
|
[4] |
HARN L.Group-oriented(t,n)threshold signature scheme and digital multi-signature[J].IEE Proceedings of Computersand Digital Technique,1994,141(5):307-313.
|
[5] |
ELGAMAL T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Transaction onInformation Theory,1985,IT-31(4):469-472.
|
[6] |
AGNEW G B,MULIN R C,van STONE S A.Improved digital signature scheme based on discrete exponentiation[J].Electronics Letters,1990,26(14):1024-1025.
|
[7] |
王斌,李建华.无可信中心的(t,n)门限签名方案[J].计算机学报,2003,26(11):1581-1584.WANG Bin,LI Jian-hua.(t,n)threshold signature scheme without a trusted party[J].Chinese Journal of Computers,2003,26(11):1581-1584.(in Chinese)
|
[8] |
XIE Qi,YU Xiu-yuan.A new(t,n)threshold signature scheme withstanding the conspiracy attack[J].Wuhan UniversityJournal of Natural Sciences,2005,10(1):107-110.
|
[9] |
张文芳,何大可,王宏霞,等.具有可追查性的抗合谋攻击(t,n)门限签名方案[J].西南交通大学学报,2007,42(4):461-467.ZHANG Wen-fang,HE Da-ke,WANG Hong-xia,et al.Conspiracy attack immune(t,n)threshold signature scheme withtraceability[J].Journal of Southwest Jiaotong University,2007,42(4):461-467.(in Chinese)
|
[10] |
POHLIG S C,HELLMAN M.An improved algorithm for computing logarithms over GF(p)and its cryptographic significance[J].IEEE Transaction on Information Theory,1978,IT-24(1):106-110.
|