Threshold Signature Scheme with Traceability and Resisting Conspiracy Attack
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    The threshold signature schemes with better security cannot only detect any member’s cheat behavior, provide anonymity and traceability simultaneously, but also resist conspiracy attack and every forgery attack. Through analysis for cryptography and algorithm design, it is discussed firstly of a method of the implementation of anonymity and traceability of threshold signature, then a partial signature verifiable (t, n) threshold signature scheme is proposed with anonymity and traceability simultaneously, resisting conspiracy attack and other forgery attacks. Based on the discrete logarithm difficulty and inverse bilinear pairing operation difficulty, certify has been given on security of the scheme in detail.

    Reference
    Related
    Cited by
Get Citation

周萍,何大可.具有可追查性的抗合谋攻击门限签名方案.计算机系统应用,2012,21(5):71-76,81

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:August 24,2011
  • Revised:October 30,2011
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063