A new (t, n) threshold signature scheme withstanding the conspiracy attack
Security of Network and Communication
Received:
- 38 Downloads
- 3 Citations
Abstract
A conspiracy attack is proposed to show that Wang-Li's scheme is insecure, because anyt or more group members can impersonate othert members to sign any message without holding the responsibility. To avoid the conspiracy attack, this paper presents a new (t, n) threshold signature scheme with traceable signers.
Key words
cryptography threshold signature conspiracy attack identifier tracingCLC number
TP 309Preview
Unable to display preview. Download preview PDF.
References
- [1]Desmedt Y, Frankel Y. Shared Generation of Authenticators and Signatures.Advances in Cryptology—CRYPTO' 91. Berlin: Springer-Verlag, 1992. 457–469.Google Scholar
- [2]Rivest R L, Shamir A, Adelman L. A Method for Obtaining Digital Signature and Public Key Cryptosystem.Comm ACM, 1978,21(2): 120–126.MATHCrossRefMathSciNetGoogle Scholar
- [3]Wang C T, Lin C H, Chang C C. Threshold Signature Schemes with Traceable Signers in Group Communications.Computer Communications, 1998,21(8): 771–776.CrossRefGoogle Scholar
- [4]Li Z C, Zhang J M, Luo J,et al. Group-Oriented (t, n) Threshold Signature Schemes with Traceable Signers.Topics in Electronic Commerce (ISEC2001), LNCS2040. Berlin: Springer-Verlag, 2001, 57–69.Google Scholar
- [5]Harn L, Group-Oriented (t, n) Threshold Digital Signature Scheme and Digitál Multisignature.IEE Proceedings of Computers and Digital and Technique, 1994,141(5): 307–313.MATHCrossRefGoogle Scholar
- [6]Gennaro R, Jarecki S, Krawczyk H,et al. Robust Threshold DSS Signatures.Information and Computation, 2001,164(1): 54–84.MATHCrossRefMathSciNetGoogle Scholar
- [7]Stinson D R, Strobl R. Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates.ACISP 2001, LNCS2119. Berlin: Springer-Verlag, 2001, 417–434.Google Scholar
- [8]Tseng Y M, Jan J K. Attacks on Threshold Signature Scheme with Traceable Signers.Information Processing Letters, 1999,71(1): 1–4.MATHCrossRefMathSciNetGoogle Scholar
- [9]Li Z C, Li L C K, Chow K P,et al. Security of Wanget al's Group-Oriented (t, n) Threshold signature Schemes with Traceable Signers.Information Processing Letters, 2001,80 (6): 295–298.MATHCrossRefMathSciNetGoogle Scholar
- [10]Wang G L, Han X X, Zhu B. On the Security of Two Threshold Signature Schemes with Traceable Signers.ACNS 2003, LNCS2846. Berlin: Springer-Verlag, 2003. 111–122.Google Scholar
- [11]Wang Bin, Li Jian-Hua, (t, n) Threshold Signature Scheme without a Trusted Party,Chinese Journal of Computers, 2003,26(11): 1581–1584 (Ch).MathSciNetGoogle Scholar
Copyright information
© Springer 2005