期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack 被引量:13
1
作者 XIE Qi 1,2, YU Xiu-yuan 3 1.Department of Mathematics, Zhejiang University, Hangzhou 310027, Zhejiang,China 2.School of Information and Engineering, Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China 3.Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期107-110,共4页
A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the cons... A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the conspiracy attack, this paper prestentsa new (t,n)threshold signature scheme with traceablt signers. A (t. n) threshold signature scheme allows t ormore group members of the group lo generate a signature on behalf of the group, Any less than tmembers cannot generate a valid signature, andany set of the group cannot impersonate another set ofmembers to sign any message without holding the responsibility. In case of disputes., the thresholdsignature can be opened, so that the original signers ean be traced without repealing the secretkeys. 展开更多
关键词 CRYPTOGRAPHY threshold signature conspiracy attack identifier tracing
下载PDF
An Anonymous Authentication Scheme Withstanding the Conspiracy Attack
2
作者 YIN Fengmei PU Guangning 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第5期415-420,共6页
A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the thr... A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the threshold sharing, a group of t members jointly implement threshold tracking. In order to improve the security of tracking, message recovery equation is used to verify and recover data leaked by the user. Compared with Liu et al’s scheme, the proposed scheme can resist conspiracy tracking and has less computational cost. On the premise of the discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf(LRSW) and Diffie-Hellman(DDH) assumption, the scheme is proved to meet the demands of anonymous authentication. The scheme has broad application prospects in many fields such as ad hoc network, electronic voting, and so on. 展开更多
关键词 anonymous authentication anonymous tracking threshold conspiracy attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部