A digital multisignature scheme using bijective public-key cryptosystems
ACM Transactions on Computer Systems (TOCS)
CRYPTO '89 Proceedings on Advances in cryptology
Attacks on threshold signature schemes with traceable signers
Information Processing Letters
Communications of the ACM
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Generalized Threshold Cryptosystems
ASIACRYPT '91 Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
A Practical Digital Multisignature Scheme Based on Discrete Logarithms
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme
ASIACRYPT '91 Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Research note: Threshold signature schemes with traceable signers in group communications
Computer Communications
A novel anonymous proxy signature scheme
Advances in Multimedia
Hi-index | 0.00 |
Elaborating on Shamir's (t, n) threshold scheme and ElGamal's digital signature scheme, we propose a group-oriented signature with distinguished signing authorities. The proposed scheme works under the following restrictions: (1) the signing document can be divided into any t smaller subdocuments in such a way that each subdocument is meaningful and will be signed as a unit by one discretionary signatory; (2) every signatory has the same knowledge domain that covers the subjects within the signing document; (3) any t out of n signatories within the group can be on behalf of the group for signing any document, and at most t - 1 participants can conspire to attack Shamir's scheme for revealing the other ones' private keys (or shadows). In the proposed scheme, every discretionary signatory signs only a smaller part of the document, instead of the whole one. Such an approach achieves the justification of labor-division and responsibility-sharing inherent in the group works. Moreover, the bandwidth of data transmission for group signature construction can be further reduced. The proposed scheme also has the property that the discretionary signatories are anonymous to the verifier outside the group, and the size of a group signature is equivalent to that of any individual signature.