A new forward secure threshold signature scheme

被引:1
作者
Yu, Jia [1 ]
Kong, Fanyu [2 ]
Hao, Rong [1 ]
机构
[1] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
[2] Shandong Univ, Inst Network Secur, Jinan, Peoples R China
来源
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS | 2006年
关键词
D O I
10.1109/ICCIAS.2006.295255
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a new forward secure threshold signature scheme is presented which is the first one from bilinear pairings. Compared with the known schemes against malicious adversary, the new scheme needs the fewest interactions and is very efficient. As an additional contribution, we present a new interactive zero-knowledge proof protocol and convert it into a non-interactive protocol to verify the validity of part signatures in this scheme. The scheme is robust against malicious adversary and forward secure in the random oracle model.
引用
收藏
页码:1243 / 1246
页数:4
相关论文
共 50 条
  • [21] A SECURE THRESHOLD GROUP SIGNATURE SCHEME
    Wang Xiaoming Fu Fangwei(School of Mathematics Science
    Journal of Electronics(China), 2003, (04) : 274 - 278
  • [22] Secure threshold proxy signature scheme
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 7 (1308-1311):
  • [23] Forward-secure threshold signature schemes
    Abdalla, M
    Miner, S
    Namprempre, C
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 441 - 456
  • [24] Identity-based forward secure threshold signature scheme based on mediated rsa
    Yu J.
    Hao R.
    Kong F.
    Cheng X.
    Zhao H.
    Chen Y.
    International Journal of Computers and Applications, 2010, 32 (04) : 469 - 475
  • [25] A Forward-Backward Secure Signature Scheme
    Lin, Dai-Rui
    Wang, Chih-I
    Guan, D. J.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (06) : 2319 - 2329
  • [26] A forward-secure blind signature scheme
    Liu, Yali
    Yin, Xinchun
    Chen, Juewei
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, : 7 - 11
  • [27] A Secure and Efficient Threshold Group Signature Scheme
    Zhang, Yansheng
    Wang, Xueming
    Qiu, Gege
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED MECHANICS, MECHATRONICS AND INTELLIGENT SYSTEMS (AMMIS2015), 2016, : 567 - 573
  • [28] A secure threshold Paillier proxy signature scheme
    Ting, Pei-yih
    Huang, Xiao-wei
    Wu, Jun-hui
    Hseu, Chia-huei
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (03): : 206 - 213
  • [29] A secure threshold Paillier proxy signature scheme
    Pei-yih TING
    Chia-huei HSEU
    Frontiers of Information Technology & Electronic Engineering, 2010, (03) : 206 - 213
  • [30] A Secure Threshold Signature Scheme from Lattices
    Wang, Kerui
    Xu, Qiuliang
    Zhang, Guoyan
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 469 - 473