%0 Journal Article
%T Threshold Signature Scheme Without a Trusted Party Resisting Conspiracy Attack
抗合谋攻击的无可信中心门限签名方案
%A WANG Ling-Ling
%A
王玲玲
%J 计算机系统应用
%D 2013
%I
%X In the existing threshold signature schemes, conspiracy attack is still a difficult problem to solved. To overcome the security weaknesses of Wang Bin's work and Wang Xin's work, a new scheme was proposed. In order to resist conspiracy attack, it utilized three ways: using model without a trusted part, it can eliminate authority cheating thoroughly and the security level was higher; adding random number and time stamp, it can prevent the attacker to recover the signer member's secret parameters and also to prevent the attack of disrupting protocol; using zero-knowledge proof verifiable method to confirm that the signer member had right secret parameters, so it can prevent the attacker to forge signature directly. The results show that this scheme is correct, and it can not only resist forgery attack and conspiracy attack, but also provide anonymity and traceability simultaneously.
%K conspiracy attack
%K forgery attack
%K without a trusted party
%K zero-knowledge proof
%K traceability
合谋攻击
%K 伪造攻击
%K 无可信中心
%K 零知识证明
%K 可追查性
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=D4F6864C950C88FFCE5B6C948A639E39&aid=72079A95883C28F70A93C6C3EC15A037&yid=FF7AA908D58E97FA&vid=BC12EA701C895178&iid=CA4FD0336C81A37A&sid=02DC3A182A5530DF&eid=5EE04844C58A42B1&journal_id=1003-3254&journal_name=计算机系统应用&referenced_num=0&reference_num=10