Computer Engineering and Applications ›› 2011, Vol. 47 ›› Issue (9): 83-85.

• 网络、通信、安全 • Previous Articles     Next Articles

Threshold signature scheme with privileged member

XU Guangbao,JIANG Donghuan   

  1. College of Information Science and Engineering,Shandong University of Science and Technology,Qingdao,Shandong 266510,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2011-03-21 Published:2011-03-21

具有特权者的门限签名方案

徐光宝,姜东焕   

  1. 山东科技大学 信息科学与工程学院,山东 青岛 266510

Abstract: After in-depth study on the threshold schemes,a new scheme is proposed.The scheme can withstand all kinds of the existing attacks because some privileges are given to the designated clerk.Compared with the existing schemes,it can efficiently protect the identities of the signers who participate in signing a message.Even all members’ identities of a group who signs a message are opened because of a dispute,none but the designated clerk can know which are done by the members in the previous signatures.Correctness and security of the new scheme are analyzed.The result shows that this scheme is secure.

Key words: threshold signature, conspiracy attack, forgery attack

摘要: 在对门限签名进行深入研究的基础上,提出了一种新方案。它给予签名合成者一些特权,这使得它能有效抵抗各种已知的攻击。相对于现有的其他方案来说,新方案有效保护了参与签名的群体成员的身份信息,即使参与某次签名的群体成员的身份因为该签名引发争议被公开,也不会导致该群体签署的其他签名被曝光。分析了方案的正确性和安全性,结果表明新方案是安全的。

关键词: 门限签名, 合谋攻击, 伪造攻击