Abstract
The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack.
Similar content being viewed by others
References
C. T. Wang, C. H. Lin, C. C. Chang, Threshold signature schemes with traceable signers in group communications, Comput. Comm., 21(1998)8, 771–776.
L. Desmedt, Y. Frankel, Shared generation of authenticators and signatures, J. Feigenbaum ed., Advances in Proceedings, Berlin, Springer-Verlag, 1998, 120–127.
Q. L. Xu, A modified threshold RSA digital signatrue scheme, Chinese Journal of Computers, 23(2000)5, 449–453, (in Chinese).
G. L. Wang, S. H. Qing, Weaknesses of some threshold group signature schemes, Chinese Journal of Software, 11(2000)10, 1326–1332, (in Chinese).
Y. M. Tseng, J. K. Jan, Attacks on threshold signature schemes with traceable signers, Information Processing Letters, 71(1999)1, 1–4.
Author information
Authors and Affiliations
Additional information
Supported in part by the National Natural Science Foundation of China under the Grant 60172060
About this article
Cite this article
Wang, X., Fu, F. A secure threshold group signature scheme. J. of Electron.(China) 20, 274–278 (2003). https://doi.org/10.1007/s11767-003-0032-8
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/s11767-003-0032-8