Skip to main content
Log in

A secure threshold group signature scheme

  • Papers
  • Published:
Journal of Electronics (China)

Abstract

The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. C. T. Wang, C. H. Lin, C. C. Chang, Threshold signature schemes with traceable signers in group communications, Comput. Comm., 21(1998)8, 771–776.

    Article  Google Scholar 

  2. L. Desmedt, Y. Frankel, Shared generation of authenticators and signatures, J. Feigenbaum ed., Advances in Proceedings, Berlin, Springer-Verlag, 1998, 120–127.

    Google Scholar 

  3. Q. L. Xu, A modified threshold RSA digital signatrue scheme, Chinese Journal of Computers, 23(2000)5, 449–453, (in Chinese).

    Google Scholar 

  4. G. L. Wang, S. H. Qing, Weaknesses of some threshold group signature schemes, Chinese Journal of Software, 11(2000)10, 1326–1332, (in Chinese).

    Google Scholar 

  5. Y. M. Tseng, J. K. Jan, Attacks on threshold signature schemes with traceable signers, Information Processing Letters, 71(1999)1, 1–4.

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Supported in part by the National Natural Science Foundation of China under the Grant 60172060

About this article

Cite this article

Wang, X., Fu, F. A secure threshold group signature scheme. J. of Electron.(China) 20, 274–278 (2003). https://doi.org/10.1007/s11767-003-0032-8

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11767-003-0032-8

Key words

Navigation