• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
XIAO Bo, JINWei, HOUMeng-shu. A NovelP2P Resource Sharing IncentiveM echanism[J]. Journal of Southwest Jiaotong University, 2005, 18(3): 417-421.
Citation: ZHANG Wenfang, HE Dake, WANG Hongxia, WANG Xiaomin. Conspiracy Attack Immune(t,n) Threshold Signature Scheme with Traceability[J]. Journal of Southwest Jiaotong University, 2007, 20(4): 461-467.

Conspiracy Attack Immune(t,n) Threshold Signature Scheme with Traceability

  • Received Date: 22 May 2006
  • Publish Date: 25 Aug 2007
  • A novel conspiracy attack immune(t,n) threshold signature scheme with traceability was proposed to overcome the weaknesses of the Wang-Li scheme and the improved Xie-Yu scheme.The security of this scheme was analyzed,and a comparison between efficiencies of the proposed scheme and the two schemes was made.The results show that the proposed scheme can not only resist conspiracy attacks and forgery attacks essentially,but also provide anonymity and traceability simultaneously.In addition,it can realize the unknowability of group’s secret by constructing a secure distributed key generation protocol.As a result,the proposed scheme is more secure than the two schemes.Furthermore,its computational complexity and communication cost are lower than the improved Xie-Yu scheme.

     

  • DESMEDT Y.Society and group oriented cryptography:a new concept[C]//Advances in Cryptology-Crypto'87 Proceedings.Berlin:Springer-Verlag,1988,LNCS293:120-127.[2] DESMEDT Y,FRANKEL Y.Threshold cryptosystems[C]// Advances in Cryptology-Crypto '89 Proceedings.Berlin:Springer-Verlag,1990,LNCS435:307-315.[3] LI C M,HWANG T,LEE N Y.Remark on the threshold RSA signature scheme[C]//Advances in Cryptology-Crypto'93Proceedings.Berlin:Springer-Verlag,1994,LNCS773:413-420.[4] HARN L.Group-oriented (t,n) threshold digital signature scheme and digital multisignature[J].IEE Proceedings of Computers and Digital and Technique,1994,141(5):307-313.[5] 王斌,李建华.无可信中心的(t,n)门限签名方案[J].计算机学报,2003;26(11):1581-1584.WANG Bin,LI Jianhua.(t,n) threshold signature scheme without a trusted party[J].Chinese Journal of Computers,2003,26(11):1581-1584.[6] ROSARIO G,STANISLAW J,HUGO K.Robust threshold DSS signatures[J].Information and Computation,2001,164(1):54-84.[7] XIE Q,Yu X Y.A new (t,n) threshold signature scheme withstanding the conspiracy attack[J].Wuhan University Journal of Natural Sciences,2005,10(1):107-110.[8] 张文芳,何大可.一个无可信中心门限签名方案的安全缺陷[C]//第九届中国密码学学术会议论文集(密码学进展-CHINACRYPT'2006).北京:中国科学技术出版社,2006:46-51.ZHANG Wenfang,HE Dake.Security analysis on a threshold signature scheme without a trusted party[C]// Advances in Cryptology-Chinacrypt'2006 Proceedings.Beijing:China Science and Technology Press,2006:45-51.[9] CAMENISH J.Group signature schemes and payment systems based on the discrete logarithm problem[D].PhD Dissertation,Switzerland:ETH Zurich,1998:11-12.
  • Relative Articles

    [1]GUOPeng, CHENG Wenming, ZHANGZeqiang. Improved Genetic Algorithm for Single Machine Scheduling Problems with Deteriorating Jobs[J]. Journal of Southwest Jiaotong University, 2011, 24(3): 506-511. doi: 3969/j.issn.0258-2724.2011.03.025
    [2]MA Yongjie, JIANG Zhaoyuan, YANG Zhimin. Dynamic Location Assignment of AS/RS Based on Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2008, 21(3): 415-421.
    [3]WU Guangning, FU Longhai, WANG Hao, LI Jin. Optimal Design of Grounding Grid Based on Improved Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2007, 20(2): 169-174.
    [4]HE Fengdao, LIANG Xiangyang, HE Dongyun. Self-Adaptive Genetic Algorithm for Locomotive Diagram[J]. Journal of Southwest Jiaotong University, 2006, 19(3): 273-278.
    [5]DAI Chaohua, ZHU Yunfang, CHEN Weirong. Cloud Theory-Based Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2006, 19(6): 729-732.
    [6]SHIYu-feng, SU Shi, PENG Qi-yuan. Optim ization ofM ilitary Transportation Routes Based on Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2005, 18(2): 241-243.
    [7]GAO Wei-zeng, ZHANG Bao-jian, CHEN Fu-gui, ZHU Jia-yi, . Optim ization ofCutting Path Based on Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2005, 18(4): 457-461.
    [8]FANG Lei, ZHANG Huan-chun, JING Ya-zhi. New Fuzzy Self-Tuning Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2005, 18(1): 22-25.
    [9]CHENGao-bo, LIUHai-yan. Interval Estimation of Chance-Constrained Programming Based on Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2004, 17(5): 687-690.
    [10]DAI Ying. Partner Selection in Supply Chain Alliance Based on Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2004, 17(4): 531-534.
    [11]FENG Chun, CHEN Yong. Genetic Algorithms for Period-Double Bifurcation of Logistic Mapping[J]. Journal of Southwest Jiaotong University, 2003, 16(3): 290-293.
    [12]ZHANG Ge-xiang, JIN Wei-dong. Improvement of Quantum Genetic Algorithm and Its Application[J]. Journal of Southwest Jiaotong University, 2003, 16(6): 717-722.
    [13]QIUXiao-ping, TANG Yong-chuan, MENG Dan, XU Yang. Multivalue Coded Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2003, 16(2): 227-130.
    [14]FENGHao, HEHong-yun, MI Zu-qiang. Nonlinear System Identification with Recurrent Neural Network Based on Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2002, 15(4): 404-407.
    [15]ZHANG Zhi-yuan, HE Chuan. A Genetic Algorithm Based on Uniform Design Paralleled with Genetic Operation[J]. Journal of Southwest Jiaotong University, 2002, 15(5): 536-340.
    [16]XIEBing-lei, LIJun, LIUJian-xin. A Heuristic Genetic Algorithm for the Travelling Salesman Problem with Time Restraints[J]. Journal of Southwest Jiaotong University, 2001, 14(2): 211-213.
    [17]CHEN Yan-ru, PUYun. Solving Traffic Equilibrium Assignment Problem with Genetic Algorithm[J]. Journal of Southwest Jiaotong University, 2000, 13(1): 44-47.
  • Created with Highcharts 5.0.7Amount of accessChart context menuAbstract Views, HTML Views, PDF Downloads StatisticsAbstract ViewsHTML ViewsPDF Downloads2024-042024-052024-062024-072024-082024-092024-102024-112024-122025-012025-022025-0302.557.51012.5
    Created with Highcharts 5.0.7Chart context menuAccess Class DistributionFULLTEXT: 29.8 %FULLTEXT: 29.8 %META: 70.2 %META: 70.2 %FULLTEXTMETA
    Created with Highcharts 5.0.7Chart context menuAccess Area Distribution其他: 3.9 %其他: 3.9 %Seattle: 0.8 %Seattle: 0.8 %北京: 0.8 %北京: 0.8 %南京: 0.4 %南京: 0.4 %哥伦布: 0.8 %哥伦布: 0.8 %宣城: 0.4 %宣城: 0.4 %张家口: 3.5 %张家口: 3.5 %杭州: 1.5 %杭州: 1.5 %武汉: 0.4 %武汉: 0.4 %泉州: 1.2 %泉州: 1.2 %芒廷维尤: 25.1 %芒廷维尤: 25.1 %芝加哥: 0.4 %芝加哥: 0.4 %西宁: 60.6 %西宁: 60.6 %邯郸: 0.4 %邯郸: 0.4 %其他Seattle北京南京哥伦布宣城张家口杭州武汉泉州芒廷维尤芝加哥西宁邯郸

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views(1109) PDF downloads(393) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return