Abstract
In this paper, we propose two group-oriented ) , ( n t threshold digital signature schemes with traceable signers. One needs the assistance of a mutually trusted center, the other does not need the assistance of a mutually trusted center. We also discuss the security and the feature of both schemes and show that the new schemes can withstand conspiracy attacks without attaching a secret number and can avoid to the forgery attacks. In addition, we show that, by the new schemes, any outsider can trace back to find who the signers are.
Supported by National 973 Project(No:G1998030420)
Supported by the Fund of Henan Province Nature Science(No:004070400)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Y. Desmedt, Y. Frankel, Shared generation of authenticators and signature, in: Advances in Cryptology-CRYPTO'91, 1991, pp.457–469
R.L. Rivest, A. Shamir, L. Adelman, A method for obtaining digital signature and public key cryptosystem, Comm. ACM 21(2) (1978) 120–126
L. Harn, Group-oriented threshold signature and digital multisignature, IEE Proceedings of Computers and Digital Techniques 141 (5) (1994) 307–313
A. Shamir, How to share a secret, Comm. ACM 22(2) (1979) 612–613
C.M. Li, T. Hwang, N.Y. Lee, Threshold signature schemes based on discrete logarithm, in: Advances in Cryptology-EUROCRYPT'94, Proceedings of Eurocrypt'94, pp.194–204
C.T Wang, C.H. Lin, C.C. Chang, Threshold signature schemes with traceable signers in group communications, Computer Communications 21 (8) (1998) 771–776
Y.M. Tseng, J.K. Jan, Attacks on threshold signature schemes with traceable signers, Information Processing Letters 71 (1999) 1–4
Z.C. Li, Y.C. Wang, Y.X. Yang and W.L. Wu, Cryptanalysis of convertible group signature, IEE, Electronics Letter, 335(13) 1999, pp. 1071–1072.
Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang and H.W. Chan: Security of Tseng-Jan’s group signature schemes'. Information Processing Letters, 2000.Vol. 75, No. 5, Pages 187–189
Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang and H.W. Chan: Security of Wang et al.’s group-oriented threshold signature scheme. to appear in Information Processing Letters.
L. Harn, Y. Xu, Design of generalized ElGamal type digital signature schemes based on discrete logarithm, Electronics Letters, 24(31) (1994) 2025–2026
G.B. Agnew, R.C., Mullin, S.A. Vanston, Improved digital signature scheme based on discrete exponentiation, Electronics Letters, 1990, 26(14), pp. 1024–1025
M. Michels, P. Horster, On the risk of disruption in several multiparty signature scheme, in: Advances in Cryptology-ASIACRYPT'96, 1997, pp.334–345
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, ZC., Dai, YQ., Zhang, JM., Luo, J., Song, W. (2001). Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers. In: Kou, W., Yesha, Y., Tan, C.J. (eds) Electronic Commerce Technologies. ISEC 2001. Lecture Notes in Computer Science, vol 2040. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45415-2_5
Download citation
DOI: https://doi.org/10.1007/3-540-45415-2_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41963-1
Online ISBN: 978-3-540-45415-1
eBook Packages: Springer Book Archive