Cryptanalysis on Lin and Wu’s Undeniable (t, n)-Threshold Signature Scheme with Cheater Identification

Author(s):  
Yan-Bin Lin ◽  
Yi-Fan Tsengg
2013 ◽  
Vol 33 (1) ◽  
pp. 15-18
Author(s):  
Xianzhi SHI ◽  
Changlu LIN ◽  
Shengyuan ZHANG ◽  
Fei TANG

2013 ◽  
Vol 756-759 ◽  
pp. 1339-1343
Author(s):  
Yu Lian Shang ◽  
Xiu Juan Wang ◽  
Yu Juan Li ◽  
Yu Fei Zhang

Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k,l) joint verification for (t,n) signature is put forward. After being signed by a signer company employing (t, n) threshold signature scheme, the informationmis transmitted to a particular verifier company, and then the signature is verified through the cooperation ofkones from the verifier company withlmembers, so as to realize a directional transmission between different companies. Finally, the application examples of the company encryption communication system, the generating polynomial of company private key and public key were given. The security of this scheme is based on Shamir threshold scheme and Elliptic Curve system, and due to the advantages of Elliptic Curve, the scheme enjoys wider application in practice.


Sign in / Sign up

Export Citation Format

Share Document