In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by th...In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.展开更多
A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the cons...A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the conspiracy attack, this paper prestentsa new (t,n)threshold signature scheme with traceablt signers. A (t. n) threshold signature scheme allows t ormore group members of the group lo generate a signature on behalf of the group, Any less than tmembers cannot generate a valid signature, andany set of the group cannot impersonate another set ofmembers to sign any message without holding the responsibility. In case of disputes., the thresholdsignature can be opened, so that the original signers ean be traced without repealing the secretkeys.展开更多
对台湾学者Jinn-K e Jan,Y uh-M in T seng和Hung-Y u Ch ien提出的“一个抗合谋攻击的门限签名方案”进行分析,通过构造有效的合谋攻击,证明其虽然经过了较为复杂的处理,付出了效率上的代价,但却仍未能阻止合谋攻击,因而完全未达到设...对台湾学者Jinn-K e Jan,Y uh-M in T seng和Hung-Y u Ch ien提出的“一个抗合谋攻击的门限签名方案”进行分析,通过构造有效的合谋攻击,证明其虽然经过了较为复杂的处理,付出了效率上的代价,但却仍未能阻止合谋攻击,因而完全未达到设计目标.展开更多
文摘In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.
文摘A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the conspiracy attack, this paper prestentsa new (t,n)threshold signature scheme with traceablt signers. A (t. n) threshold signature scheme allows t ormore group members of the group lo generate a signature on behalf of the group, Any less than tmembers cannot generate a valid signature, andany set of the group cannot impersonate another set ofmembers to sign any message without holding the responsibility. In case of disputes., the thresholdsignature can be opened, so that the original signers ean be traced without repealing the secretkeys.