• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Huixian, Cai Wandong, Pang Liaojun. A Secure Dynamic Threshold Signature Scheme[J]. Journal of Computer Research and Development, 2007, 44(9): 1545-1549.
Citation: Li Huixian, Cai Wandong, Pang Liaojun. A Secure Dynamic Threshold Signature Scheme[J]. Journal of Computer Research and Development, 2007, 44(9): 1545-1549.

A Secure Dynamic Threshold Signature Scheme

More Information
  • Published Date: September 14, 2007
  • In most available threshold signature schemes, only one group secret key is shared among a group of signers and the threshold value is fixed. However, in many occasions, the number of signers often depends entirely on the significance of the document. The solution usually is to construct a threshold signature scheme for different threshold value. It is obvious that there is a great deal of repeated computation and the efficiency is very low in this method. Motivated by this concern, based on the intractability of the discrete logarithm problem, a new dynamic threshold signature scheme that solves the above problem is proposed in the paper. In the proposed scheme, multiple group secret keys are shared among a group of signers, and each group secret key has its specific threshold value. Different group secret keys can be chosen flexibly to sign documents depending on their significance. Each signer needs to keep only one secret shadow and a secret value, and no public shadow is needed. Analyses show that, compared with the existing schemes, the proposed scheme can resist to various attacks from internal or external attackers, and protect the signature from allied cheating, which indicates that the proposed scheme is capable of providing more security and practicability.
  • Related Articles

    [1]Fan Wei, Liu Yong. Social Network Information Diffusion Prediction Based on Spatial-Temporal Transformer[J]. Journal of Computer Research and Development, 2022, 59(8): 1757-1769. DOI: 10.7544/issn1000-1239.20220064
    [2]Cao Jiuxin, Gao Qingqing, Xia Rongqing, Liu Weijia, Zhu Xuelin, Liu Bo. Information Propagation Prediction and Specific Information Suppression in Social Networks[J]. Journal of Computer Research and Development, 2021, 58(7): 1490-1503. DOI: 10.7544/issn1000-1239.2021.20200809
    [3]Xu Mingda, Zhang Zike, Xu Xiaoke. Research on Spreading Mechanism of False Information in Social Networks by Motif Degree[J]. Journal of Computer Research and Development, 2021, 58(7): 1425-1435. DOI: 10.7544/issn1000-1239.2021.20200806
    [4]Li Yingying, Ma Shuai, Jiang Haoyi, Liu Zhe, Hu Chunming, Li Xiong. An Approach for Storytelling by Correlating Events from Social Networks[J]. Journal of Computer Research and Development, 2018, 55(9): 1972-1986. DOI: 10.7544/issn1000-1239.2018.20180155
    [5]Liao Guoqiong, Jiang Shan, Zhou Zhiheng, Wan Changxuan. Dual Fine-Granularity POI Recommendation on Location-Based Social Networks[J]. Journal of Computer Research and Development, 2017, 54(11): 2600-2610. DOI: 10.7544/issn1000-1239.2017.20160502
    [6]Tan Zhenhua, Shi Yingcheng, Shi Nanxiang, Yang Guangming, Wang Xingwei. Rumor Propagation Analysis Model Inspired by Gravity Theory for Online Social Networks[J]. Journal of Computer Research and Development, 2017, 54(11): 2586-2599. DOI: 10.7544/issn1000-1239.2017.20160434
    [7]Wang Zhenwen, Xiao Weidong, and Tan Wentang. Classification in Networked Data Based on the Probability Generative Model[J]. Journal of Computer Research and Development, 2013, 50(12): 2642-2650.
    [8]Tan Wentang, Wang Zhenwen, Yin Fengjing, Ge Bin, and Xiao Weidong. A Partial Comparative Cross Collections LDA Model[J]. Journal of Computer Research and Development, 2013, 50(9): 1943-1953.
    [9]Guo Qiaojin, Li Ning, Yang Yubin, and Wu Gangshan. LDA-CRF: Object Detection Based on Graphical Model[J]. Journal of Computer Research and Development, 2012, 49(11): 2296-2304.
    [10]Li Zhi, Li Qianmu, Zhang Hong, Liu Fengyu. Closely Social Circuit Based Routing in Social Delay Tolerant Networks[J]. Journal of Computer Research and Development, 2012, 49(6): 1185-1195.

Catalog

    Article views (624) PDF downloads (503) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return