Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers
In this paper, we propose two group-oriented ) , ( n t threshold digital signature schemes with traceable signers. One needs the assistance of a mutually trusted center, the other does not need the assistance of a mutually trusted center. We also discuss the security and the feature of both schemes...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 69 |
---|---|
container_issue | |
container_start_page | 57 |
container_title | |
container_volume | 2040 |
creator | Li, Zi-Chen Dai, Yi-Qi Zhang, Jun-Mei Luo, Jun Song, William |
description | In this paper, we propose two group-oriented ) , ( n t threshold digital signature schemes with traceable signers. One needs the assistance of a mutually trusted center, the other does not need the assistance of a mutually trusted center. We also discuss the security and the feature of both schemes and show that the new schemes can withstand conspiracy attacks without attaching a secret number and can avoid to the forgery attacks. In addition, we show that, by the new schemes, any outsider can trace back to find who the signers are. |
doi_str_mv | 10.1007/3-540-45415-2_5 |
format | Book Chapter |
fullrecord | <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_786306</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3071949_34_67</sourcerecordid><originalsourceid>FETCH-LOGICAL-p264t-8fbb6808c8ad8e639aa6bf84954273de8f3f31d457a65dbf6aaf2fd068535a3e3</originalsourceid><addsrcrecordid>eNpFkM1LJDEQxbPuKg7unL02eFEwmqSSdHIUPxcEF5w9h-ruZLq17W6THmT_e-MoWJeC9149qB8hh5ydccbKc6BKMiqV5IoKp36QpS0NZG0r8R2y4JpzCiDtz2-PWw38F1kwYILaUsIeWVhllABQdp8sU3pieUAIo_iC_L2N42aiD7Hzw-yb4ng-LYaTYtVGn9qxb4qrbt3N2BeP3XrAeRN98Vi3_sWn4q2b22IVsfZY9X4b8DH9JrsB--SXX_uA_Lu5Xl3e0fuH2z-XF_d0ElrO1ISq0oaZ2mBjvAaLqKtgpFVSlNB4EyAAb6QqUaumChoxiNAwbRQoBA8H5Oizd8JUYx8iDnWX3BS7F4z_XWk0MJ1T9DOVsjGsfXTVOD4nx5n7YOzAZWZuC9Rlxjkvvlrj-LrxaXb-46DOcCL2dYvTnH90wEpupXUgnS7hHc4OeKM</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3071949_34_67</pqid></control><display><type>book_chapter</type><title>Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers</title><source>Springer Books</source><creator>Li, Zi-Chen ; Dai, Yi-Qi ; Zhang, Jun-Mei ; Luo, Jun ; Song, William</creator><contributor>Tan, Chung J ; Kou, Weidong ; Yesha, Yelena</contributor><creatorcontrib>Li, Zi-Chen ; Dai, Yi-Qi ; Zhang, Jun-Mei ; Luo, Jun ; Song, William ; Tan, Chung J ; Kou, Weidong ; Yesha, Yelena</creatorcontrib><description>In this paper, we propose two group-oriented ) , ( n t threshold digital signature schemes with traceable signers. One needs the assistance of a mutually trusted center, the other does not need the assistance of a mutually trusted center. We also discuss the security and the feature of both schemes and show that the new schemes can withstand conspiracy attacks without attaching a secret number and can avoid to the forgery attacks. In addition, we show that, by the new schemes, any outsider can trace back to find who the signers are.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540419631</identifier><identifier>ISBN: 3540419632</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540454151</identifier><identifier>EISBN: 3540454152</identifier><identifier>DOI: 10.1007/3-540-45415-2_5</identifier><identifier>OCLC: 958523359</identifier><identifier>LCCallNum: HF4999.2-6182</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; Exact sciences and technology ; Forgery Attack ; Secret Sharing Scheme ; Signature Scheme ; Signature Verification ; Telecommunications ; Telecommunications and information theory ; Teleprocessing networks. Isdn ; Traceable Signer</subject><ispartof>Electronic Commerce Technologies, 2001, Vol.2040, p.57-69</ispartof><rights>Springer-Verlag Berlin Heidelberg 2001</rights><rights>2001 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3071949-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/3-540-45415-2_5$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/3-540-45415-2_5$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=786306$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Tan, Chung J</contributor><contributor>Kou, Weidong</contributor><contributor>Yesha, Yelena</contributor><creatorcontrib>Li, Zi-Chen</creatorcontrib><creatorcontrib>Dai, Yi-Qi</creatorcontrib><creatorcontrib>Zhang, Jun-Mei</creatorcontrib><creatorcontrib>Luo, Jun</creatorcontrib><creatorcontrib>Song, William</creatorcontrib><title>Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers</title><title>Electronic Commerce Technologies</title><description>In this paper, we propose two group-oriented ) , ( n t threshold digital signature schemes with traceable signers. One needs the assistance of a mutually trusted center, the other does not need the assistance of a mutually trusted center. We also discuss the security and the feature of both schemes and show that the new schemes can withstand conspiracy attacks without attaching a secret number and can avoid to the forgery attacks. In addition, we show that, by the new schemes, any outsider can trace back to find who the signers are.</description><subject>Applied sciences</subject><subject>Exact sciences and technology</subject><subject>Forgery Attack</subject><subject>Secret Sharing Scheme</subject><subject>Signature Scheme</subject><subject>Signature Verification</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Teleprocessing networks. Isdn</subject><subject>Traceable Signer</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540419631</isbn><isbn>3540419632</isbn><isbn>9783540454151</isbn><isbn>3540454152</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2001</creationdate><recordtype>book_chapter</recordtype><recordid>eNpFkM1LJDEQxbPuKg7unL02eFEwmqSSdHIUPxcEF5w9h-ruZLq17W6THmT_e-MoWJeC9149qB8hh5ydccbKc6BKMiqV5IoKp36QpS0NZG0r8R2y4JpzCiDtz2-PWw38F1kwYILaUsIeWVhllABQdp8sU3pieUAIo_iC_L2N42aiD7Hzw-yb4ng-LYaTYtVGn9qxb4qrbt3N2BeP3XrAeRN98Vi3_sWn4q2b22IVsfZY9X4b8DH9JrsB--SXX_uA_Lu5Xl3e0fuH2z-XF_d0ElrO1ISq0oaZ2mBjvAaLqKtgpFVSlNB4EyAAb6QqUaumChoxiNAwbRQoBA8H5Oizd8JUYx8iDnWX3BS7F4z_XWk0MJ1T9DOVsjGsfXTVOD4nx5n7YOzAZWZuC9Rlxjkvvlrj-LrxaXb-46DOcCL2dYvTnH90wEpupXUgnS7hHc4OeKM</recordid><startdate>2001</startdate><enddate>2001</enddate><creator>Li, Zi-Chen</creator><creator>Dai, Yi-Qi</creator><creator>Zhang, Jun-Mei</creator><creator>Luo, Jun</creator><creator>Song, William</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>2001</creationdate><title>Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers</title><author>Li, Zi-Chen ; Dai, Yi-Qi ; Zhang, Jun-Mei ; Luo, Jun ; Song, William</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p264t-8fbb6808c8ad8e639aa6bf84954273de8f3f31d457a65dbf6aaf2fd068535a3e3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Applied sciences</topic><topic>Exact sciences and technology</topic><topic>Forgery Attack</topic><topic>Secret Sharing Scheme</topic><topic>Signature Scheme</topic><topic>Signature Verification</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Teleprocessing networks. Isdn</topic><topic>Traceable Signer</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Zi-Chen</creatorcontrib><creatorcontrib>Dai, Yi-Qi</creatorcontrib><creatorcontrib>Zhang, Jun-Mei</creatorcontrib><creatorcontrib>Luo, Jun</creatorcontrib><creatorcontrib>Song, William</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Zi-Chen</au><au>Dai, Yi-Qi</au><au>Zhang, Jun-Mei</au><au>Luo, Jun</au><au>Song, William</au><au>Tan, Chung J</au><au>Kou, Weidong</au><au>Yesha, Yelena</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers</atitle><btitle>Electronic Commerce Technologies</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2001</date><risdate>2001</risdate><volume>2040</volume><spage>57</spage><epage>69</epage><pages>57-69</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540419631</isbn><isbn>3540419632</isbn><eisbn>9783540454151</eisbn><eisbn>3540454152</eisbn><abstract>In this paper, we propose two group-oriented ) , ( n t threshold digital signature schemes with traceable signers. One needs the assistance of a mutually trusted center, the other does not need the assistance of a mutually trusted center. We also discuss the security and the feature of both schemes and show that the new schemes can withstand conspiracy attacks without attaching a secret number and can avoid to the forgery attacks. In addition, we show that, by the new schemes, any outsider can trace back to find who the signers are.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/3-540-45415-2_5</doi><oclcid>958523359</oclcid><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Electronic Commerce Technologies, 2001, Vol.2040, p.57-69 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_786306 |
source | Springer Books |
subjects | Applied sciences Exact sciences and technology Forgery Attack Secret Sharing Scheme Signature Scheme Signature Verification Telecommunications Telecommunications and information theory Teleprocessing networks. Isdn Traceable Signer |
title | Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T03%3A18%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Group-Oriented%20(t,%20n)%20Threshold%20Digital%20Signature%20Schemes%20with%20Traceable%20Signers&rft.btitle=Electronic%20Commerce%20Technologies&rft.au=Li,%20Zi-Chen&rft.date=2001&rft.volume=2040&rft.spage=57&rft.epage=69&rft.pages=57-69&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540419631&rft.isbn_list=3540419632&rft_id=info:doi/10.1007/3-540-45415-2_5&rft_dat=%3Cproquest_pasca%3EEBC3071949_34_67%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540454151&rft.eisbn_list=3540454152&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3071949_34_67&rft_id=info:pmid/&rfr_iscdi=true |