Attacks on threshold signature schemes with traceable signers
Information Processing Letters
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Security of Tseng-Jan's group signature schemes
Information Processing Letters
Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers
Information Processing Letters
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On the Risk of Disruption in Several Multiparty Signature Schemes
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Research note: Threshold signature schemes with traceable signers in group communications
Computer Communications
A robust coalition-resistant threshold signature scheme with anonymous signers
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Hi-index | 0.01 |
In this paper, we propose two group-oriented (t, n) threshold digital signature schemes with traceable signers. One needs the assistance of a mutually trusted center, the other does not need the assistance of a mutually trusted center. We also discuss the security and the feature of both schemes and show that the new schemes can withstand conspiracy attacks without attaching a secret number and can avoid to the forgery attacks. In addition, we show that, by the new schemes, any outsider can trace back to find who the signers are.