An sub-signature verification protocol using (t, k) threshold RSA signature without trusted center

  • Authors:
  • Yanjiong Wang;Qiaoyan Wen;Hua Zhang

  • Affiliations:
  • State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China;State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China;State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China

  • Venue:
  • WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Common digital signature scheme is based on public key infrastructure. Each node should keep a certificate, this makes digital signature scalable to large numbers of participation and relies on a trusted center. On the other hand, conventional group signature scheme cannot find which participant gives a error or forged sub-signature. The protocol we proposed in this paper features a none trusted center group signature scheme, which not only ensures high-level tolerance to the network attack, but also detects the suspicious node in the system. This protocol can be applied in ad hoc networks.