In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by th...In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.展开更多
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi...The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure.展开更多
Identity authentication plays an important role in ad hoc networks as a part of the secure mechanism. On the basis of GQ signature scheme, a new GQ threshold group signature scheme was presented, by which a novel dist...Identity authentication plays an important role in ad hoc networks as a part of the secure mechanism. On the basis of GQ signature scheme, a new GQ threshold group signature scheme was presented, by which a novel distributed algorithm was proposed to achieve the multi-hop authentication for mobile ad hoc networks. In addition, a protocol verifying the identity with zero knowledge proofs was designed so that the reuse of certificates comes into truth. Moreover, the security of this algorithm was proved through the random oracle model. With the lower cost of computation and communication, this algorithm is efficient, secure and especially suitable for mobile ad hoc networks characterized by distributed computing, dynamic topology and multi-hop communications.展开更多
文摘In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.
基金The National Natural Science Foundation of China (No60403027)
文摘The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure.
文摘Identity authentication plays an important role in ad hoc networks as a part of the secure mechanism. On the basis of GQ signature scheme, a new GQ threshold group signature scheme was presented, by which a novel distributed algorithm was proposed to achieve the multi-hop authentication for mobile ad hoc networks. In addition, a protocol verifying the identity with zero knowledge proofs was designed so that the reuse of certificates comes into truth. Moreover, the security of this algorithm was proved through the random oracle model. With the lower cost of computation and communication, this algorithm is efficient, secure and especially suitable for mobile ad hoc networks characterized by distributed computing, dynamic topology and multi-hop communications.