WU Chunhui, CHEN Xiaofeng, LONG Dongyang. A New Effcient On-line/Off-line Threshold Signature Scheme[J]. Chinese Journal of Electronics, 2009, 18(2): 321-324.
Citation: WU Chunhui, CHEN Xiaofeng, LONG Dongyang. A New Effcient On-line/Off-line Threshold Signature Scheme[J]. Chinese Journal of Electronics, 2009, 18(2): 321-324.

A New Effcient On-line/Off-line Threshold Signature Scheme

More Information
  • Received Date: November 30, 2007
  • Revised Date: November 30, 2008
  • Published Date: May 24, 2009
  • It seems that all existing on-line/offline (threshold) signature schemes based on ShamirTauman's paradigm suffer from the key exposure problemof chameleon hashing. In this paper, we firstly proposea new effcient generic on-line/off-line threshold signaturescheme without key exposure. Compared with Crutchfieldet al.'s scheme, the advantages of our scheme are the lowercomputation and storage cost in off-line phase and lowercommunication cost in on-line phase. Meanwhile, we proveour scheme can achieve the desired security notions.
  • Related Articles

    [1]GUO Ping, ZHU Jian, CHEN Haizhu, YANG Ruilong. A Linear-Time Solution for All-SAT Problem Based on P System[J]. Chinese Journal of Electronics, 2018, 27(2): 367-373. DOI: 10.1049/cje.2018.01.008
    [2]JIA Jianwei, LIU Jinhui, ZHANG Huanguo. Cryptanalysis of a Key Exchange Protocol Based on Commuting Matrices[J]. Chinese Journal of Electronics, 2017, 26(5): 947-951. DOI: 10.1049/cje.2017.08.013
    [3]XIANG Xinyin, LI Hui, ZHAO Xingwen. Key Evolving Attribute-Based Signature Under Short Integer Solution Problem[J]. Chinese Journal of Electronics, 2016, 25(5): 901-906. DOI: 10.1049/cje.2016.08.042
    [4]ZHU Yan, WANG Shanbiao, MA Di, FENG Rongquan. Identity-Based Encryption on RSA Without Pairings and Key Escrow[J]. Chinese Journal of Electronics, 2014, 23(4): 842-850.
    [5]ZHANG Qikun, ZHANG Quanxin, MA Zhongmei, TAN Yu'an. An Authenticated Asymmetric Group Key Agreement for Imbalanced Mobile Networks[J]. Chinese Journal of Electronics, 2014, 23(4): 827-835.
    [6]LIU Shengli, TILBORG Henk van, WENG Jian, CHEN Kefei. Authentication Codes from ε-ASU Hash Functions with Partially Secret Keys[J]. Chinese Journal of Electronics, 2014, 23(4): 790-793.
    [7]YANG Xiaodong, WANG Caifen, ZHANG Lei, QIU Jianbin. On-line/Off-line Threshold Proxy Re-Signatures[J]. Chinese Journal of Electronics, 2014, 23(2): 248-253.
    [8]GUO Yuanbo, MA Jianfeng, WANG Chao, YANG Kuiwu. Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs[J]. Chinese Journal of Electronics, 2013, 22(4): 820-825.
    [9]YANG Xiaodong and WANG Caifen. Threshold Proxy Re-signature Schemes in theStandard Model[J]. Chinese Journal of Electronics, 2010, 19(2): 345-350.
    [10]DU Hongzhen, WEN Qiaoyan. Effcient Certificateless Designated Verifier Signatures and Proxy Signatures[J]. Chinese Journal of Electronics, 2009, 18(1): 95-100.

Catalog

    Article Metrics

    Article views (804) PDF downloads (709) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return