A New Threshold Signature Scheme to Withstand the Conspiracy Attack

Author(s):  
Jie Wang ◽  
Yongquan Cai ◽  
Jingyang He
2014 ◽  
Vol 8 (6) ◽  
pp. 3027-3032
Author(s):  
Yu-Fang Chung ◽  
Tzer-Shyong Chen ◽  
Tzer-Long Chen

2013 ◽  
Vol 33 (1) ◽  
pp. 15-18
Author(s):  
Xianzhi SHI ◽  
Changlu LIN ◽  
Shengyuan ZHANG ◽  
Fei TANG

2013 ◽  
Vol 756-759 ◽  
pp. 1339-1343
Author(s):  
Yu Lian Shang ◽  
Xiu Juan Wang ◽  
Yu Juan Li ◽  
Yu Fei Zhang

Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k,l) joint verification for (t,n) signature is put forward. After being signed by a signer company employing (t, n) threshold signature scheme, the informationmis transmitted to a particular verifier company, and then the signature is verified through the cooperation ofkones from the verifier company withlmembers, so as to realize a directional transmission between different companies. Finally, the application examples of the company encryption communication system, the generating polynomial of company private key and public key were given. The security of this scheme is based on Shamir threshold scheme and Elliptic Curve system, and due to the advantages of Elliptic Curve, the scheme enjoys wider application in practice.


Sign in / Sign up

Export Citation Format

Share Document