Abstract
In this paper we present a novel robust coalition-resistant (t, n) threshold signature scheme with anonymous signers. Only t or more group members can generate signatures on behalf of a group with n members, while any t-1 or fewer members cannot do the same thing. We construct the scheme based on a modified RSA digital signature scheme and Shamir’s secret sharing scheme. The signature process consists of four phases: system setup, individual signature generation and verification, sign and verify. The designated signature combiner can verify the partial signature from the auxiliary value of the partial signature, and the scheme can resist the coalition attack from more than t malicious group members due to the use of shadow partial signature. Compared with the existing threshold signature schemes, the scheme is robust and secure, and convenient to implement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Desmedt, Y.G.: Society and group oriented cryptography: A new concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120–127. Springer, Heidelberg (1988)
Desmedt, Y.G., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457–469. Springer, Heidelberg (1992)
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust and efficient sharing of RSA functions. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 157–172. Springer, Heidelberg (1996)
Harn, L.: Group-oriented (t, n) threshold digital signature scheme and multisignature. IEE proceedings– Computers and Digital Techniques 141(5), 307–313 (1994)
Li, C.-M., Hwang, T., Lee, N.-Y.: Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 194–204. Springer, Heidelberg (1995)
Li, Z.-C., Zhang, J.-M., Luo, J., Song, W., Dai, Y.-Q.: Group-oriented (t, n) threshold digital signature schemes with traceable signers. In: Kou, W., Yesha, Y., Tan, C.J.K. (eds.) ISEC 2001. LNCS, vol. 2040, pp. 57–69. Springer, Heidelberg (2001)
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)
Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207–220. Springer, Heidelberg (2000)
Tseng, Y., Jan, J.: Attacks on threshold signature schemes with traceable signers. Information Processing Letters 71, 1–4 (1999)
Wang, G., Han, X., Zhu, B.: On the security of two threshold signature schemes with traceable signers. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 111–122. Springer, Heidelberg (2003)
Wang, C.T., Lin, C.H., Chang, C.C.: Threshold signature schemes with traceable signers in group communications. Computer Communications 21(8), 771–776 (1998)
Wang, G.L., Qing, S.H.: Weaknesses of some threshold group signature schemes. Journal of Software 11(10), 1326–1332 (2000)
Xu, Q.L.: A modified threshold RSA digital signature scheme. Chinese Journal of Computers 23(5), 449–453 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, Mw., Zhu, Qx., Qing, L. (2005). A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds) Parallel and Distributed Processing and Applications - ISPA 2005 Workshops. ISPA 2005. Lecture Notes in Computer Science, vol 3759. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11576259_35
Download citation
DOI: https://doi.org/10.1007/11576259_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29770-3
Online ISBN: 978-3-540-32115-6
eBook Packages: Computer ScienceComputer Science (R0)