Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

An Sub-Signature Verification Protocol Using (t, k) Threshold RSA Signature without Trusted Center

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
3 Author(s)
Yanjiong Wang ; State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China ; Qiaoyan Wen ; Hua Zhang

Common digital signature scheme is based on public key infrastructure. Each node should keep a certificate, this makes digital signature scalable to large numbers of participation and relies on a trusted center. On the other hand, conventional group signature scheme cannot find which participant gives a error or forged sub-signature. The protocol we proposed in this paper features a none trusted center group signature scheme, which not only ensures high-level tolerance to the network attack, but also detects the suspicious node in the system. This protocol can be applied in ad hoc networks.

Published in:

Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. 5th International Conference on

Date of Conference:

24-26 Sept. 2009