• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
Volume 20 Issue 4
Aug.  2007
Turn off MathJax
Article Contents
ZHANG Wenfang, HE Dake, WANG Hongxia, WANG Xiaomin. Conspiracy Attack Immune(t,n) Threshold Signature Scheme with Traceability[J]. Journal of Southwest Jiaotong University, 2007, 20(4): 461-467.
Citation: ZHANG Wenfang, HE Dake, WANG Hongxia, WANG Xiaomin. Conspiracy Attack Immune(t,n) Threshold Signature Scheme with Traceability[J]. Journal of Southwest Jiaotong University, 2007, 20(4): 461-467.

Conspiracy Attack Immune(t,n) Threshold Signature Scheme with Traceability

  • Received Date: 22 May 2006
  • Publish Date: 25 Aug 2007
  • A novel conspiracy attack immune(t,n) threshold signature scheme with traceability was proposed to overcome the weaknesses of the Wang-Li scheme and the improved Xie-Yu scheme.The security of this scheme was analyzed,and a comparison between efficiencies of the proposed scheme and the two schemes was made.The results show that the proposed scheme can not only resist conspiracy attacks and forgery attacks essentially,but also provide anonymity and traceability simultaneously.In addition,it can realize the unknowability of group’s secret by constructing a secure distributed key generation protocol.As a result,the proposed scheme is more secure than the two schemes.Furthermore,its computational complexity and communication cost are lower than the improved Xie-Yu scheme.

     

  • loading
  • DESMEDT Y.Society and group oriented cryptography:a new concept[C]//Advances in Cryptology-Crypto'87 Proceedings.Berlin:Springer-Verlag,1988,LNCS293:120-127.[2] DESMEDT Y,FRANKEL Y.Threshold cryptosystems[C]// Advances in Cryptology-Crypto '89 Proceedings.Berlin:Springer-Verlag,1990,LNCS435:307-315.[3] LI C M,HWANG T,LEE N Y.Remark on the threshold RSA signature scheme[C]//Advances in Cryptology-Crypto'93Proceedings.Berlin:Springer-Verlag,1994,LNCS773:413-420.[4] HARN L.Group-oriented (t,n) threshold digital signature scheme and digital multisignature[J].IEE Proceedings of Computers and Digital and Technique,1994,141(5):307-313.[5] 王斌,李建华.无可信中心的(t,n)门限签名方案[J].计算机学报,2003;26(11):1581-1584.WANG Bin,LI Jianhua.(t,n) threshold signature scheme without a trusted party[J].Chinese Journal of Computers,2003,26(11):1581-1584.[6] ROSARIO G,STANISLAW J,HUGO K.Robust threshold DSS signatures[J].Information and Computation,2001,164(1):54-84.[7] XIE Q,Yu X Y.A new (t,n) threshold signature scheme withstanding the conspiracy attack[J].Wuhan University Journal of Natural Sciences,2005,10(1):107-110.[8] 张文芳,何大可.一个无可信中心门限签名方案的安全缺陷[C]//第九届中国密码学学术会议论文集(密码学进展-CHINACRYPT'2006).北京:中国科学技术出版社,2006:46-51.ZHANG Wenfang,HE Dake.Security analysis on a threshold signature scheme without a trusted party[C]// Advances in Cryptology-Chinacrypt'2006 Proceedings.Beijing:China Science and Technology Press,2006:45-51.[9] CAMENISH J.Group signature schemes and payment systems based on the discrete logarithm problem[D].PhD Dissertation,Switzerland:ETH Zurich,1998:11-12.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views(1069) PDF downloads(393) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return