A Group of Threshold Group-Signature Schemes with Privilege Subsets

نویسندگان

  • CHEN Wei-Dong
  • FENG Deng-Guo
چکیده

(State Key Laboratory of Information Security (Graduate School, The Chinese Academy of Sciences), Beijing 100049, China) (Institute of Electronics, The Chinese Academy of Sciences, Beijing 100080, China) (State Key Laboratory of Information Security (Institute of Software, The Chinese Academy of Sciences), Beijing 100080, China) + Corresponding author: Phn: +86-10-66842704, Fax: +86-10-62645000, E-mail: [email protected], http://gscas.ac.cn Received 2003-12-01; Accepted 2004-07-06

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Some Protocols Useful on the Internet from Threshold Signature Schemes

In a threshold signature scheme, a group of players shares some secret information in such a way that only those subsets with a minimum number of players can compute a valid signature. In this paper we propose methods to construct some computationally secure distributed protocols from threshold signature schemes. Namely, we construct metering schemes from threshold non-interactive signature sch...

متن کامل

Fully Distributed Proxy Signature Schemes

In a proxy signature scheme, a potential signer delegates his signing capability to a proxy entity, who signs a message on behalf of the original signer. All the proposals of proxy signature schemes made until now have been based on Schnorr's signature scheme. Threshold versions of these schemes have also been proposed, in which the power of the proxy signer is distributed among a group of play...

متن کامل

A Group Signature Scheme with Distributed Group Management — An Application of Threshold Encryption

We present group signature schemes that distribute group management using threshold encryption. To our best knowledge, we are the first to construct and analyze such schemes in detail. The threshold encryption schemes we employ to distribute group management are based on Shamir secret sharing and monotone span programs. We analyze our schemes not only in a static scenario, but also under group ...

متن کامل

On the Security of Two Threshold Signature Schemes with Traceable Signers

A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same thing. In 2001, based on a variant of ElGamal digital signature scheme, Li et al. proposed two (t, n) threshold signature schemes with traceable signers. One of their schemes needs the assistance of a mutually trusted cen...

متن کامل

Blind Threshold Signatures Based on Discrete Logarithm

In this paper, we propose two group-oriented (t; n) blind threshold signature schemes based on the discrete logarithm problem. By these schemes, any t out of n signers in a group can represent the group to sign blind threshold signatures. In our schemes, the size of a threshold signature is the same as the size of an individual signature and the signature veriication process is simpliied by mea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005