A Group of Threshold Group-Signature Schemes with Privilege Subsets
نویسندگان
چکیده
(State Key Laboratory of Information Security (Graduate School, The Chinese Academy of Sciences), Beijing 100049, China) (Institute of Electronics, The Chinese Academy of Sciences, Beijing 100080, China) (State Key Laboratory of Information Security (Institute of Software, The Chinese Academy of Sciences), Beijing 100080, China) + Corresponding author: Phn: +86-10-66842704, Fax: +86-10-62645000, E-mail: [email protected], http://gscas.ac.cn Received 2003-12-01; Accepted 2004-07-06
منابع مشابه
Some Protocols Useful on the Internet from Threshold Signature Schemes
In a threshold signature scheme, a group of players shares some secret information in such a way that only those subsets with a minimum number of players can compute a valid signature. In this paper we propose methods to construct some computationally secure distributed protocols from threshold signature schemes. Namely, we construct metering schemes from threshold non-interactive signature sch...
متن کاملFully Distributed Proxy Signature Schemes
In a proxy signature scheme, a potential signer delegates his signing capability to a proxy entity, who signs a message on behalf of the original signer. All the proposals of proxy signature schemes made until now have been based on Schnorr's signature scheme. Threshold versions of these schemes have also been proposed, in which the power of the proxy signer is distributed among a group of play...
متن کاملA Group Signature Scheme with Distributed Group Management — An Application of Threshold Encryption
We present group signature schemes that distribute group management using threshold encryption. To our best knowledge, we are the first to construct and analyze such schemes in detail. The threshold encryption schemes we employ to distribute group management are based on Shamir secret sharing and monotone span programs. We analyze our schemes not only in a static scenario, but also under group ...
متن کاملOn the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same thing. In 2001, based on a variant of ElGamal digital signature scheme, Li et al. proposed two (t, n) threshold signature schemes with traceable signers. One of their schemes needs the assistance of a mutually trusted cen...
متن کاملBlind Threshold Signatures Based on Discrete Logarithm
In this paper, we propose two group-oriented (t; n) blind threshold signature schemes based on the discrete logarithm problem. By these schemes, any t out of n signers in a group can represent the group to sign blind threshold signatures. In our schemes, the size of a threshold signature is the same as the size of an individual signature and the signature veriication process is simpliied by mea...
متن کامل