Cryptanalysis and improvement of a (t, n) threshold group signature scheme

被引:0
|
作者
Ren Guo
Xiaogang Cheng
机构
[1] Huaqiao University,College of Business Administration
[2] Huaqiao University,College of Computer Science and Technology
来源
关键词
Threshold signature; Group signature; Quantum signature; Cryptanalysis;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, a (t, n) threshold group signature scheme is present in Qin et al. (Quantum Inf Process 19(2):71, 2020). In this paper, we point out that it is not a threshold signature scheme, namely any number of members can generate a valid signature. By introducing a secret sharing scheme, we show how to improve the original scheme to a threshold signature scheme. In the original scheme, the key for the one-time pad encryption is used more than once, which makes the verifier recover the key and fabricate any signature at his will. We show how to close this security loophole. And we also show how to add a round for checking the honesty of the arbitrator, and thus the trust put on the arbitrator can be reduced.
引用
收藏
相关论文
共 50 条
  • [41] Undeniable (t, n)-threshold signature scheme with cheater identification
    Lin, TY
    Wu, TC
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 1998, 21 (06) : 775 - 780
  • [42] A novel efficient (t, n) threshold proxy signature scheme
    Huang, HF
    Chang, CC
    INFORMATION SCIENCES, 2006, 176 (10) : 1338 - 1349
  • [43] A (t, n) threshold signature scheme against conspiracy attack
    Zheng, Minghui
    Zhu, Jianhua
    Cui, Guohua
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1218 - 1221
  • [44] An efficient threshold group signature scheme
    Hu, Chengyu
    Li, Daxing
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 338 - +
  • [45] A SECURE THRESHOLD GROUP SIGNATURE SCHEME
    Wang Xiaoming Fu Fangwei(School of Mathematics Science
    JournalofElectronics(China), 2003, (04) : 274 - 278
  • [46] An efficient threshold group signature scheme
    Chen, TS
    Hsiao, TC
    Chen, TL
    TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B13 - B16
  • [47] An efficient threshold group signature scheme
    Yu, YL
    Chen, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 362 - 371
  • [48] On/Off Threshold Group Signature Scheme
    Wang Xiaoming
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 69 - 73
  • [49] Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme
    Wang, Huaqun
    Deng, Changhui
    Zhao, Shuping
    Zhang, Futai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 935 - +
  • [50] Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme
    Chande, Manoj Kumar
    Lee, Cheng-Chi
    Li, Chun-Ta
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01): : 23 - 34