Applied Mathematics & Information Sciences
Abstract
The study presents a threshold signature scheme. While developing threshold cryptography, the concept of threshold signature can accomplish a tradeoff between efficiency in use and dependability of security. The presented threshold signature scheme can resist conspiracy attack by controlling the right of issuing group signature, and the performance of constructing group signature is also enhanced by simplifying keys.
Suggested Reviewers
N/A
Digital Object Identifier (DOI)
http://dx.doi.org/10.12785/amis/080642
Recommended Citation
Chung, Yu-Fang; Chen, Tzer-Shyong; and Chen, Tzer-Long
(2014)
"An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack,"
Applied Mathematics & Information Sciences: Vol. 08:
Iss.
6, Article 42.
DOI: http://dx.doi.org/10.12785/amis/080642
Available at:
https://digitalcommons.aaru.edu.jo/amis/vol08/iss6/42