Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2009, Vol. 35 ›› Issue (11): 148-149. doi: 10.3969/j.issn.1000-3428.2009.11.050

• Security Technology • Previous Articles     Next Articles

Improved Traceable Threshold Signature Scheme

WANG Ping-shu1, GUAN Hui-sheng2   

  1. (1. Department of Mathematics, Qinghai Unversity for Nationalities, Xining 810007; 2. School of Information Science & Engineering, Lanzhou University, Lanzhou 730000)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-06-05 Published:2009-06-05

一种改进的可追踪门限签名方案

王萍姝1,管会生2   

  1. (1. 青海民族大学数学系,西宁 810007;2. 兰州大学信息科学与工程学院,兰州730000)

Abstract: It is proved that an early traceable threshold signature scheme hasn’t the property of traceability. Aiming at the weakness, this paper proposes an improvement to the scheme. Theoratical analysis proves actual signers can be revealed by trusted center to open group signature and also can prove if they join in the signature or not, efficiently prevents forgery attacks and masquerade attacks from inner members of group effectively.

Key words: traceable, threshold signature, forgery attack, security

摘要: 早先的一种具有追踪性的门限签名方案,已被证明不具有可追踪性。针对该方案存在的缺陷,对其进行改进。理论分析证明,改进的方案在发生纠纷时可打开群签名追踪实际签名者,签名者能证明自己是否参与签名,并有效抵御群体内部的伪造攻击和冒充攻击。

关键词: 可追踪, 门限签名, 伪造攻击, 安全

CLC Number: