Citation: | ZHANG Wenfang, HE Dake, WANG Hongxia, WANG Xiaomin. Conspiracy Attack Immune(t,n) Threshold Signature Scheme with Traceability[J]. Journal of Southwest Jiaotong University, 2007, 20(4): 461-467. |
DESMEDT Y.Society and group oriented cryptography:a new concept[C]//Advances in Cryptology-Crypto'87 Proceedings.Berlin:Springer-Verlag,1988,LNCS293:120-127.[2] DESMEDT Y,FRANKEL Y.Threshold cryptosystems[C]// Advances in Cryptology-Crypto '89 Proceedings.Berlin:Springer-Verlag,1990,LNCS435:307-315.[3] LI C M,HWANG T,LEE N Y.Remark on the threshold RSA signature scheme[C]//Advances in Cryptology-Crypto'93Proceedings.Berlin:Springer-Verlag,1994,LNCS773:413-420.[4] HARN L.Group-oriented (t,n) threshold digital signature scheme and digital multisignature[J].IEE Proceedings of Computers and Digital and Technique,1994,141(5):307-313.[5] 王斌,李建华.无可信中心的(t,n)门限签名方案[J].计算机学报,2003;26(11):1581-1584.WANG Bin,LI Jianhua.(t,n) threshold signature scheme without a trusted party[J].Chinese Journal of Computers,2003,26(11):1581-1584.[6] ROSARIO G,STANISLAW J,HUGO K.Robust threshold DSS signatures[J].Information and Computation,2001,164(1):54-84.[7] XIE Q,Yu X Y.A new (t,n) threshold signature scheme withstanding the conspiracy attack[J].Wuhan University Journal of Natural Sciences,2005,10(1):107-110.[8] 张文芳,何大可.一个无可信中心门限签名方案的安全缺陷[C]//第九届中国密码学学术会议论文集(密码学进展-CHINACRYPT'2006).北京:中国科学技术出版社,2006:46-51.ZHANG Wenfang,HE Dake.Security analysis on a threshold signature scheme without a trusted party[C]// Advances in Cryptology-Chinacrypt'2006 Proceedings.Beijing:China Science and Technology Press,2006:45-51.[9] CAMENISH J.Group signature schemes and payment systems based on the discrete logarithm problem[D].PhD Dissertation,Switzerland:ETH Zurich,1998:11-12.
|