Article ID Journal Published Year Pages File Type
456290 Computers & Security 2006 6 Pages PDF
Abstract

In recent years, a great deal of work has been done on threshold signature schemes and many excellent schemes have been proposed. In Eurocrypt'94, Li et al. [Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. In: Advances in Cryptology—Proceedings of EUROCRYPT 94; 1994. p. 413–9] proposed a threshold signature scheme with traceability, which allows us to trace back to find the signer without revealing the secret keys. And in 2001, Lee [Threshold signature scheme with multiple signing policies. IEE Proc Comput Digit Tech 2001;148(2):95–9] proposed a threshold signature scheme with multiple signing policies, which allows multiple secret keys to be shared among a group of users, and each secret key has its specific threshold value. In this paper, based on these schemes, we present a traceable threshold signature scheme with multiple signing policies, which not only inherits their properties, but also fixes their weaknesses.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,