2013 5th International Conference on Intelligent Networking and Collaborative Systems 2013
DOI: 10.1109/incos.2013.121
|View full text |Cite
|
Sign up to set email alerts
|

(t, n) Threshold Digital Signature Scheme with Traceable Signers against Conspiracy Attacks

Abstract: In this paper, one group-oriented (t,n) threshold digital signature schemes with traceable signers are proposed by introducing the white key technology. We also discuss the security and the characteristic of the schemes and show that the new schemes can withstand conspiracy attacks without attaching a secret number and can avoid the forgery attacks. In addition, we show that any outsider can trace back to find who the signers are.Keywords-conspiracy attacks threshold digital signature traceabl public key;

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 11 publications
(20 reference statements)
0
1
0
Order By: Relevance
“…Furthermore, the work in [41] presents an idea of masking group's private key to prevent group members who can collaborate to recover it but need a trusted party that use all member private keys to construct group signature and so one can argue that does not meet the requirement for non-repudiation. Various previous schemes often assumed the number of users being controlled by an adversary less than threshold number [35], [36], [40], [42] to keep groups private key safe.…”
Section: Design Goals Of Anonymous Authenticated Communicationmentioning
confidence: 99%
“…Furthermore, the work in [41] presents an idea of masking group's private key to prevent group members who can collaborate to recover it but need a trusted party that use all member private keys to construct group signature and so one can argue that does not meet the requirement for non-repudiation. Various previous schemes often assumed the number of users being controlled by an adversary less than threshold number [35], [36], [40], [42] to keep groups private key safe.…”
Section: Design Goals Of Anonymous Authenticated Communicationmentioning
confidence: 99%