期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack 被引量:13
1
作者 xie qi 1,2,{1., zhejiang university, hangzhou 310027, zhejiang,china 2.School of Information and Engineering, hangzhou Teachers College, hangzhou 310012, zhejiang, china 3.hangzhou Teachers College, hangzhou 310012, zhejiang, china 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期107-110,共4页
A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the cons... A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the conspiracy attack, this paper prestentsa new (t,n)threshold signature scheme with traceablt signers. A (t. n) threshold signature scheme allows t ormore group members of the group lo generate a signature on behalf of the group, Any less than tmembers cannot generate a valid signature, andany set of the group cannot impersonate another set ofmembers to sign any message without holding the responsibility. In case of disputes., the thresholdsignature can be opened, so that the original signers ean be traced without repealing the secretkeys. 展开更多
关键词 CRYPTOGRAPHY threshold signature conspiracy attack identifier tracing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部