Threshold Signature Scheme with Traceability and Resisting Conspiracy Attack
CSTR:
Author:
  • Article
  • | |
  • Metrics
  • |
  • Reference [9]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    The threshold signature schemes with better security cannot only detect any member’s cheat behavior, provide anonymity and traceability simultaneously, but also resist conspiracy attack and every forgery attack. Through analysis for cryptography and algorithm design, it is discussed firstly of a method of the implementation of anonymity and traceability of threshold signature, then a partial signature verifiable (t, n) threshold signature scheme is proposed with anonymity and traceability simultaneously, resisting conspiracy attack and other forgery attacks. Based on the discrete logarithm difficulty and inverse bilinear pairing operation difficulty, certify has been given on security of the scheme in detail.

    Reference
    1 Desmedt Y, Frankel Y. Shared Generation of Authenticators and Signatures. In: Feigenbaum J, ed, Advances in Cryptology-Crypto’91 Proc. LNCS 576, Berlin: Springer- Verlag, 1992:457?469.
    2 Xie Q. Cryptanalysis and improvement of two threshold signature schemes. Journal of Communications, 2005,26(7):123?128.
    3 徐光宝,姜东焕.抗合谋攻击的门限签名方案分析与改进.计算工程,2010,36(20):155?156,166.
    4 高炜,于晓冬.对一个无可信中心的(t,n)门限签名方案的改进,2010,46(1):84?86.
    5 Li CM, Hwang T, Lee NY. Remark on the threshold RSA signature scheme. In: Stinson DR, ed, Advances in Crypto logy-Crypto’93 Proc. LNCS773, Berlin: Springer-Verlag,1994: 413-420.
    6 王贵林,卿斯汉.几个门限群签名方案的弱点.软件学报,2000,11(10):1326?1332.
    7 Waters B. Efficient identity-based encryption without random oracles. Advances in Cryptology-Eurocrypt 2005. LNCS3494, Berlin: Springer-Verlag, 2005: 114?127.
    8 Gennaro R, Jarecki S, Krawczyk H, Rabin T. Secure distributed key generation for discrete-log based cryptosystems. Advances in Cryptology -EUROCRYPT 1999. LNCS 1592, Berlin: Springer-Verlag, 1999, 295?310.
    9 辛向军,肖国镇.几种具有附加性质的数字签名体制的研究 [博士学位论文].西安:西安电子科技大学,2007.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

周萍,何大可.具有可追查性的抗合谋攻击门限签名方案.计算机系统应用,2012,21(5):71-76,81

Copy
Share
Article Metrics
  • Abstract:1679
  • PDF: 3121
  • HTML: 0
  • Cited by: 0
History
  • Received:August 24,2011
  • Revised:October 30,2011
Article QR Code
You are the first990822Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063