By Topic

A new threshold signature scheme against conspiracy attack based on open ID authentication information

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Zhaoyang Qu ; School of Information Engineering, Northeast Dianli University, Jilin City, China ; Hong Ji ; Yingjin Zhang

The conspiracy attack on (t,n) threshold signature is still an open problem. For solving the problem, this paper proposes a new signature scheme, which is based on the idea of opening the sets of ID authentication information. Using two sets of secret key algorithm, the scheme attaches a secret random ID authentication information to the shareholder's secret key and provide a verify equation for the ID authentication information. Then, the new scheme opens the sets of the enciphered ID authentication information and makes that an important parameter to against conspiracy attack. The security discussion shows that more than t collusive members cooperate can neither forge the threshold signature nor impersonate other members to forge partial signatures, and the forged threshold signature which implies traceability of adversarial members can be discovered by the signature verifier in time.

Published in:

Power Electronics and Intelligent Transportation System (PEITS), 2009 2nd International Conference on  (Volume:2 )

Date of Conference:

19-20 Dec. 2009