Wuhan University Journal of Natural Sciences

, Volume 10, Issue 1, pp 107–110 | Cite as

A new (t, n) threshold signature scheme withstanding the conspiracy attack

Security of Network and Communication

Abstract

A conspiracy attack is proposed to show that Wang-Li's scheme is insecure, because anyt or more group members can impersonate othert members to sign any message without holding the responsibility. To avoid the conspiracy attack, this paper presents a new (t, n) threshold signature scheme with traceable signers.

Key words

cryptography threshold signature conspiracy attack identifier tracing 

CLC number

TP 309 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Desmedt Y, Frankel Y. Shared Generation of Authenticators and Signatures.Advances in Cryptology—CRYPTO' 91. Berlin: Springer-Verlag, 1992. 457–469.Google Scholar
  2. [2]
    Rivest R L, Shamir A, Adelman L. A Method for Obtaining Digital Signature and Public Key Cryptosystem.Comm ACM, 1978,21(2): 120–126.MATHCrossRefMathSciNetGoogle Scholar
  3. [3]
    Wang C T, Lin C H, Chang C C. Threshold Signature Schemes with Traceable Signers in Group Communications.Computer Communications, 1998,21(8): 771–776.CrossRefGoogle Scholar
  4. [4]
    Li Z C, Zhang J M, Luo J,et al. Group-Oriented (t, n) Threshold Signature Schemes with Traceable Signers.Topics in Electronic Commerce (ISEC2001), LNCS2040. Berlin: Springer-Verlag, 2001, 57–69.Google Scholar
  5. [5]
    Harn L, Group-Oriented (t, n) Threshold Digital Signature Scheme and Digitál Multisignature.IEE Proceedings of Computers and Digital and Technique, 1994,141(5): 307–313.MATHCrossRefGoogle Scholar
  6. [6]
    Gennaro R, Jarecki S, Krawczyk H,et al. Robust Threshold DSS Signatures.Information and Computation, 2001,164(1): 54–84.MATHCrossRefMathSciNetGoogle Scholar
  7. [7]
    Stinson D R, Strobl R. Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates.ACISP 2001, LNCS2119. Berlin: Springer-Verlag, 2001, 417–434.Google Scholar
  8. [8]
    Tseng Y M, Jan J K. Attacks on Threshold Signature Scheme with Traceable Signers.Information Processing Letters, 1999,71(1): 1–4.MATHCrossRefMathSciNetGoogle Scholar
  9. [9]
    Li Z C, Li L C K, Chow K P,et al. Security of Wanget al's Group-Oriented (t, n) Threshold signature Schemes with Traceable Signers.Information Processing Letters, 2001,80 (6): 295–298.MATHCrossRefMathSciNetGoogle Scholar
  10. [10]
    Wang G L, Han X X, Zhu B. On the Security of Two Threshold Signature Schemes with Traceable Signers.ACNS 2003, LNCS2846. Berlin: Springer-Verlag, 2003. 111–122.Google Scholar
  11. [11]
    Wang Bin, Li Jian-Hua, (t, n) Threshold Signature Scheme without a Trusted Party,Chinese Journal of Computers, 2003,26(11): 1581–1584 (Ch).MathSciNetGoogle Scholar

Copyright information

© Springer 2005

Authors and Affiliations

  1. 1.Department of MathematicsZhejiang UniversityHangzhouChina
  2. 2.School of Information and EnginceringHungzhou Teachers CollegeHangzhouChina
  3. 3.Hangzhou Teachers CollegeHangzhouChina

Personalised recommendations