Attacks on threshold signature schemes with traceable signers
Information Processing Letters
Communications of the ACM
Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Robust and Efficient Sharing of RSA Functions
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Research note: Threshold signature schemes with traceable signers in group communications
Computer Communications
Hi-index | 0.00 |
In this paper we present a novel robust coalition-resistant (t, n) threshold signature scheme with anonymous signers. Only t or more group members can generate signatures on behalf of a group with n members, while any t-1 or fewer members cannot do the same thing. We construct the scheme based on a modified RSA digital signature scheme and Shamir’s secret sharing scheme. The signature process consists of four phases: system setup, individual signature generation and verification, sign and verify. The designated signature combiner can verify the partial signature from the auxiliary value of the partial signature, and the scheme can resist the coalition attack from more than t malicious group members due to the use of shadow partial signature. Compared with the existing threshold signature schemes, the scheme is robust and secure, and convenient to implement.