A new forward secure threshold signature scheme

被引:1
作者
Yu, Jia [1 ]
Kong, Fanyu [2 ]
Hao, Rong [1 ]
机构
[1] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
[2] Shandong Univ, Inst Network Secur, Jinan, Peoples R China
来源
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS | 2006年
关键词
D O I
10.1109/ICCIAS.2006.295255
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a new forward secure threshold signature scheme is presented which is the first one from bilinear pairings. Compared with the known schemes against malicious adversary, the new scheme needs the fewest interactions and is very efficient. As an additional contribution, we present a new interactive zero-knowledge proof protocol and convert it into a non-interactive protocol to verify the validity of part signatures in this scheme. The scheme is robust against malicious adversary and forward secure in the random oracle model.
引用
收藏
页码:1243 / 1246
页数:4
相关论文
共 50 条
[21]   A SECURE THRESHOLD GROUP SIGNATURE SCHEME [J].
Wang Xiaoming Fu FangweiSchool of Mathematics Science Nankai University Tianjin College of Automatic Qingdao University Qingdao .
Journal of Electronics(China), 2003, (04) :274-278
[22]   Secure threshold proxy signature scheme [J].
Department of Computer Science, Jinan University, Guangzhou 510632, China ;
不详 .
Dianzi Yu Xinxi Xuebao, 2006, 7 (1308-1311)
[23]   Forward-secure threshold signature schemes [J].
Abdalla, M ;
Miner, S ;
Namprempre, C .
TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 :441-456
[24]   Identity-based forward secure threshold signature scheme based on mediated rsa [J].
Yu J. ;
Hao R. ;
Kong F. ;
Cheng X. ;
Zhao H. ;
Chen Y. .
International Journal of Computers and Applications, 2010, 32 (04) :469-475
[25]   A Forward-Backward Secure Signature Scheme [J].
Lin, Dai-Rui ;
Wang, Chih-I ;
Guan, D. J. .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (06) :2319-2329
[26]   A forward-secure blind signature scheme [J].
Liu, Yali ;
Yin, Xinchun ;
Chen, Juewei .
CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, :7-11
[27]   A Secure and Efficient Threshold Group Signature Scheme [J].
Zhang, Yansheng ;
Wang, Xueming ;
Qiu, Gege .
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED MECHANICS, MECHATRONICS AND INTELLIGENT SYSTEMS (AMMIS2015), 2016, :567-573
[28]   A secure threshold Paillier proxy signature scheme [J].
Ting, Pei-yih ;
Huang, Xiao-wei ;
Wu, Jun-hui ;
Hseu, Chia-huei .
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (03) :206-213
[29]   A secure threshold Paillier proxy signature scheme [J].
Pei-yih TING ;
Chia-huei HSEU .
Frontiers of Information Technology & Electronic Engineering, 2010, (03) :206-213
[30]   A Secure Threshold Signature Scheme from Lattices [J].
Wang, Kerui ;
Xu, Qiuliang ;
Zhang, Guoyan .
2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, :469-473