Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers

In this paper, we propose two group-oriented ) , ( n t threshold digital signature schemes with traceable signers. One needs the assistance of a mutually trusted center, the other does not need the assistance of a mutually trusted center. We also discuss the security and the feature of both schemes...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Li, Zi-Chen, Dai, Yi-Qi, Zhang, Jun-Mei, Luo, Jun, Song, William
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 69
container_issue
container_start_page 57
container_title
container_volume 2040
creator Li, Zi-Chen
Dai, Yi-Qi
Zhang, Jun-Mei
Luo, Jun
Song, William
description In this paper, we propose two group-oriented ) , ( n t threshold digital signature schemes with traceable signers. One needs the assistance of a mutually trusted center, the other does not need the assistance of a mutually trusted center. We also discuss the security and the feature of both schemes and show that the new schemes can withstand conspiracy attacks without attaching a secret number and can avoid to the forgery attacks. In addition, we show that, by the new schemes, any outsider can trace back to find who the signers are.
doi_str_mv 10.1007/3-540-45415-2_5
format Book Chapter
fullrecord <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_786306</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3071949_34_67</sourcerecordid><originalsourceid>FETCH-LOGICAL-p264t-8fbb6808c8ad8e639aa6bf84954273de8f3f31d457a65dbf6aaf2fd068535a3e3</originalsourceid><addsrcrecordid>eNpFkM1LJDEQxbPuKg7unL02eFEwmqSSdHIUPxcEF5w9h-ruZLq17W6THmT_e-MoWJeC9149qB8hh5ydccbKc6BKMiqV5IoKp36QpS0NZG0r8R2y4JpzCiDtz2-PWw38F1kwYILaUsIeWVhllABQdp8sU3pieUAIo_iC_L2N42aiD7Hzw-yb4ng-LYaTYtVGn9qxb4qrbt3N2BeP3XrAeRN98Vi3_sWn4q2b22IVsfZY9X4b8DH9JrsB--SXX_uA_Lu5Xl3e0fuH2z-XF_d0ElrO1ISq0oaZ2mBjvAaLqKtgpFVSlNB4EyAAb6QqUaumChoxiNAwbRQoBA8H5Oizd8JUYx8iDnWX3BS7F4z_XWk0MJ1T9DOVsjGsfXTVOD4nx5n7YOzAZWZuC9Rlxjkvvlrj-LrxaXb-46DOcCL2dYvTnH90wEpupXUgnS7hHc4OeKM</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3071949_34_67</pqid></control><display><type>book_chapter</type><title>Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers</title><source>Springer Books</source><creator>Li, Zi-Chen ; Dai, Yi-Qi ; Zhang, Jun-Mei ; Luo, Jun ; Song, William</creator><contributor>Tan, Chung J ; Kou, Weidong ; Yesha, Yelena</contributor><creatorcontrib>Li, Zi-Chen ; Dai, Yi-Qi ; Zhang, Jun-Mei ; Luo, Jun ; Song, William ; Tan, Chung J ; Kou, Weidong ; Yesha, Yelena</creatorcontrib><description>In this paper, we propose two group-oriented ) , ( n t threshold digital signature schemes with traceable signers. One needs the assistance of a mutually trusted center, the other does not need the assistance of a mutually trusted center. We also discuss the security and the feature of both schemes and show that the new schemes can withstand conspiracy attacks without attaching a secret number and can avoid to the forgery attacks. In addition, we show that, by the new schemes, any outsider can trace back to find who the signers are.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540419631</identifier><identifier>ISBN: 3540419632</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540454151</identifier><identifier>EISBN: 3540454152</identifier><identifier>DOI: 10.1007/3-540-45415-2_5</identifier><identifier>OCLC: 958523359</identifier><identifier>LCCallNum: HF4999.2-6182</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; Exact sciences and technology ; Forgery Attack ; Secret Sharing Scheme ; Signature Scheme ; Signature Verification ; Telecommunications ; Telecommunications and information theory ; Teleprocessing networks. Isdn ; Traceable Signer</subject><ispartof>Electronic Commerce Technologies, 2001, Vol.2040, p.57-69</ispartof><rights>Springer-Verlag Berlin Heidelberg 2001</rights><rights>2001 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3071949-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/3-540-45415-2_5$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/3-540-45415-2_5$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=786306$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Tan, Chung J</contributor><contributor>Kou, Weidong</contributor><contributor>Yesha, Yelena</contributor><creatorcontrib>Li, Zi-Chen</creatorcontrib><creatorcontrib>Dai, Yi-Qi</creatorcontrib><creatorcontrib>Zhang, Jun-Mei</creatorcontrib><creatorcontrib>Luo, Jun</creatorcontrib><creatorcontrib>Song, William</creatorcontrib><title>Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers</title><title>Electronic Commerce Technologies</title><description>In this paper, we propose two group-oriented ) , ( n t threshold digital signature schemes with traceable signers. One needs the assistance of a mutually trusted center, the other does not need the assistance of a mutually trusted center. We also discuss the security and the feature of both schemes and show that the new schemes can withstand conspiracy attacks without attaching a secret number and can avoid to the forgery attacks. In addition, we show that, by the new schemes, any outsider can trace back to find who the signers are.</description><subject>Applied sciences</subject><subject>Exact sciences and technology</subject><subject>Forgery Attack</subject><subject>Secret Sharing Scheme</subject><subject>Signature Scheme</subject><subject>Signature Verification</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Teleprocessing networks. Isdn</subject><subject>Traceable Signer</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540419631</isbn><isbn>3540419632</isbn><isbn>9783540454151</isbn><isbn>3540454152</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2001</creationdate><recordtype>book_chapter</recordtype><recordid>eNpFkM1LJDEQxbPuKg7unL02eFEwmqSSdHIUPxcEF5w9h-ruZLq17W6THmT_e-MoWJeC9149qB8hh5ydccbKc6BKMiqV5IoKp36QpS0NZG0r8R2y4JpzCiDtz2-PWw38F1kwYILaUsIeWVhllABQdp8sU3pieUAIo_iC_L2N42aiD7Hzw-yb4ng-LYaTYtVGn9qxb4qrbt3N2BeP3XrAeRN98Vi3_sWn4q2b22IVsfZY9X4b8DH9JrsB--SXX_uA_Lu5Xl3e0fuH2z-XF_d0ElrO1ISq0oaZ2mBjvAaLqKtgpFVSlNB4EyAAb6QqUaumChoxiNAwbRQoBA8H5Oizd8JUYx8iDnWX3BS7F4z_XWk0MJ1T9DOVsjGsfXTVOD4nx5n7YOzAZWZuC9Rlxjkvvlrj-LrxaXb-46DOcCL2dYvTnH90wEpupXUgnS7hHc4OeKM</recordid><startdate>2001</startdate><enddate>2001</enddate><creator>Li, Zi-Chen</creator><creator>Dai, Yi-Qi</creator><creator>Zhang, Jun-Mei</creator><creator>Luo, Jun</creator><creator>Song, William</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>2001</creationdate><title>Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers</title><author>Li, Zi-Chen ; Dai, Yi-Qi ; Zhang, Jun-Mei ; Luo, Jun ; Song, William</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p264t-8fbb6808c8ad8e639aa6bf84954273de8f3f31d457a65dbf6aaf2fd068535a3e3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Applied sciences</topic><topic>Exact sciences and technology</topic><topic>Forgery Attack</topic><topic>Secret Sharing Scheme</topic><topic>Signature Scheme</topic><topic>Signature Verification</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Teleprocessing networks. Isdn</topic><topic>Traceable Signer</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Zi-Chen</creatorcontrib><creatorcontrib>Dai, Yi-Qi</creatorcontrib><creatorcontrib>Zhang, Jun-Mei</creatorcontrib><creatorcontrib>Luo, Jun</creatorcontrib><creatorcontrib>Song, William</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Zi-Chen</au><au>Dai, Yi-Qi</au><au>Zhang, Jun-Mei</au><au>Luo, Jun</au><au>Song, William</au><au>Tan, Chung J</au><au>Kou, Weidong</au><au>Yesha, Yelena</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers</atitle><btitle>Electronic Commerce Technologies</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2001</date><risdate>2001</risdate><volume>2040</volume><spage>57</spage><epage>69</epage><pages>57-69</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540419631</isbn><isbn>3540419632</isbn><eisbn>9783540454151</eisbn><eisbn>3540454152</eisbn><abstract>In this paper, we propose two group-oriented ) , ( n t threshold digital signature schemes with traceable signers. One needs the assistance of a mutually trusted center, the other does not need the assistance of a mutually trusted center. We also discuss the security and the feature of both schemes and show that the new schemes can withstand conspiracy attacks without attaching a secret number and can avoid to the forgery attacks. In addition, we show that, by the new schemes, any outsider can trace back to find who the signers are.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/3-540-45415-2_5</doi><oclcid>958523359</oclcid><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Electronic Commerce Technologies, 2001, Vol.2040, p.57-69
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_786306
source Springer Books
subjects Applied sciences
Exact sciences and technology
Forgery Attack
Secret Sharing Scheme
Signature Scheme
Signature Verification
Telecommunications
Telecommunications and information theory
Teleprocessing networks. Isdn
Traceable Signer
title Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T03%3A18%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Group-Oriented%20(t,%20n)%20Threshold%20Digital%20Signature%20Schemes%20with%20Traceable%20Signers&rft.btitle=Electronic%20Commerce%20Technologies&rft.au=Li,%20Zi-Chen&rft.date=2001&rft.volume=2040&rft.spage=57&rft.epage=69&rft.pages=57-69&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540419631&rft.isbn_list=3540419632&rft_id=info:doi/10.1007/3-540-45415-2_5&rft_dat=%3Cproquest_pasca%3EEBC3071949_34_67%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540454151&rft.eisbn_list=3540454152&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3071949_34_67&rft_id=info:pmid/&rfr_iscdi=true