Anti-conspiracy attack threshold signature model and protocol. (5th September 2019)
- Record Type:
- Journal Article
- Title:
- Anti-conspiracy attack threshold signature model and protocol. (5th September 2019)
- Main Title:
- Anti-conspiracy attack threshold signature model and protocol
- Authors:
- Wang, Xiaoping
Ning, Zhenhu
Wang, Wei
Yang, Yongli - Abstract:
- Threshold signature has security and robustness, so more and more scholars pay close attention to it. Aiming at the disadvantage that it cannot prevent conspiracy attack, this paper makes full use of tracing set and other technologies, proposes a threshold signature model which can withstand the conspiracy attack and resolves conspiracy attack problem successfully. Moreover, the model can prevent replay attack, has forward security and without the support of the trusted centre. At last, this paper proves that in the standard model, the model is unforgeable under adaptive chosen message attack.
- Is Part Of:
- International journal of wireless and mobile computing. Volume 17:Number 3(2019)
- Journal:
- International journal of wireless and mobile computing
- Issue:
- Volume 17:Number 3(2019)
- Issue Display:
- Volume 17, Issue 3 (2019)
- Year:
- 2019
- Volume:
- 17
- Issue:
- 3
- Issue Sort Value:
- 2019-0017-0003-0000
- Page Start:
- 300
- Page End:
- 306
- Publication Date:
- 2019-09-05
- Subjects:
- threshold signature -- conspiracy attack
Mobile computing -- Periodicals
Wireless communication systems -- Periodicals
004.6 - Journal URLs:
- http://www.inderscience.com/info/inissues.php?jcode=ijwmc ↗
http://www.inderscience.com/ ↗ - Languages:
- English
- ISSNs:
- 1741-1084
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - BLDSS-3PM
British Library STI - ELD Digital store - Ingest File:
- 11232.xml