By Topic

An Sub-Signature Verification Protocol Using (t, k) Threshold RSA Signature without Trusted Center

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Yanjiong Wang ; State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China ; Qiaoyan Wen ; Hua Zhang

Common digital signature scheme is based on public key infrastructure. Each node should keep a certificate, this makes digital signature scalable to large numbers of participation and relies on a trusted center. On the other hand, conventional group signature scheme cannot find which participant gives a error or forged sub-signature. The protocol we proposed in this paper features a none trusted center group signature scheme, which not only ensures high-level tolerance to the network attack, but also detects the suspicious node in the system. This protocol can be applied in ad hoc networks.

Published in:

2009 5th International Conference on Wireless Communications, Networking and Mobile Computing

Date of Conference:

24-26 Sept. 2009