A new forward secure threshold signature scheme

被引:1
作者
Yu, Jia [1 ]
Kong, Fanyu [2 ]
Hao, Rong [1 ]
机构
[1] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
[2] Shandong Univ, Inst Network Secur, Jinan, Peoples R China
来源
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS | 2006年
关键词
D O I
10.1109/ICCIAS.2006.295255
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a new forward secure threshold signature scheme is presented which is the first one from bilinear pairings. Compared with the known schemes against malicious adversary, the new scheme needs the fewest interactions and is very efficient. As an additional contribution, we present a new interactive zero-knowledge proof protocol and convert it into a non-interactive protocol to verify the validity of part signatures in this scheme. The scheme is robust against malicious adversary and forward secure in the random oracle model.
引用
收藏
页码:1243 / 1246
页数:4
相关论文
共 50 条
[31]   Provably Secure Forward Secure Certificateless Proxy Signature Scheme [J].
Li, Jiguo ;
Li, Yanqiong ;
Zhang, Yichen .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (08) :1972-1988
[32]   Secure (T,N) threshold signature scheme [J].
Wang, Bin ;
Pan, Hao-Dong ;
Li, Jian-Hua .
Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2002, 36 (09) :1333-1336
[33]   Secure Undeniable Threshold Proxy Signature Scheme [J].
Aboud, Sattar J. .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) :63-68
[34]   A secure threshold Paillier proxy signature scheme [J].
Pei-yih Ting ;
Xiao-wei Huang ;
Jun-hui Wu ;
Chia-huei Hseu .
Journal of Zhejiang University SCIENCE C, 2010, 11 :206-213
[35]   An Efficient and Flexible Forward-Secure Signature Scheme [J].
Huang, Hui-Feng ;
Chang, Chin -Chen .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B) :211-219
[36]   Improvement of a Forward-Secure Ring Signature Scheme [J].
Wang Jian-dong ;
Zou Hui .
2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, :1216-1218
[37]   AN EFFICIENT FORWARD SECURE GROUP SIGNATURE SCHEME WITH REVOCATION [J].
Sun Huihui Chen Shaozhen Department of Applied Mathematics Zhengzhou Information Engineering University Zhengzhou China .
Journal of Electronics(China), 2008, (06) :797-802
[38]   On the security of a forward-backward secure signature scheme [J].
Wang, Liangliang ;
Chen, Kefei ;
Mao, Xianping ;
Wang, Yongtao .
International Journal of Network Security, 2015, 17 (03) :307-310
[39]   Cryptanalysis of an Improved Forward Secure Proxy Signature Scheme [J].
Xia, Xiangsheng ;
Wan, Hongyun ;
Hong, Fan ;
Cui, Guohua .
PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, :502-+
[40]   An untraceable forward-secure blind signature scheme [J].
Huang, Hui-Feng ;
Chang, Chin-Chen .
IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, :441-+