Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2004, Vol. 5 Issue (1): 50-54    DOI: 10.1631/jzus.2004.0050
Computer & Information Science     
Verifiable threshold signature schemes against conspiracy attack
GAN Yuan-ju
College of Information Science and Engineering, Central South University, Changsha 410075, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  In this study, the author has designed new verifiable (t,n) threshold untraceable signature schemes. The proposed schemes have the following properties: (1) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters, such as the group secret key, and forge other member\'s individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.

Key wordsCryptography      Threshold group signature      Conspiracy attack      Forgery attack     
Received: 30 March 2003     
CLC:  TP309  
Cite this article:

GAN Yuan-ju. Verifiable threshold signature schemes against conspiracy attack. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5(1): 50-54.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.2004.0050     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2004/V5/I1/50

[1] Yong-ping DAN, Xue-cheng ZOU, Zheng-lin LIU, Yu HAN, Li-hua YI. High-performance hardware architecture of elliptic curve cryptography processor over GF(2163)[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 301-310.
[2] XIE Qi, YU Xiu-yuan. A novel group signature with one time secret key[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6(6): 560-564.
[3] JIANG Jun, HE Chen. A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 8-.
[4] XIE Qi, YU Xiu-yuan. Improvement of Laih and Yen?ˉs multisignature scheme[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5( 9): 20-.