• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ma Chunbo, He Dake. A New Chameleon Threshold Signature Based on Bilinear Pairing[J]. Journal of Computer Research and Development, 2005, 42(8): 1427-1430.
Citation: Ma Chunbo, He Dake. A New Chameleon Threshold Signature Based on Bilinear Pairing[J]. Journal of Computer Research and Development, 2005, 42(8): 1427-1430.

A New Chameleon Threshold Signature Based on Bilinear Pairing

More Information
  • Published Date: August 14, 2005
  • Consider the following situations: there are two companies A and B, and they want to communicate with each other over the Internet. In order to generate a secure signature on behalf of the company A, A requires that only enough members in A can generate a valid signature by cooperation. At the same time, company A wants only the designated receiver who can verify the signature. Motivated by this consideration and the necessity of protecting the security of original information, this paper, which combines the sharing secret technology and Chameleon function, presents a new signature based on bilinear pairing. It is only the designated receiver that can verify the signature and can't convince the third party of the valid signature. It is undeniable and when a dispute occurs, the signer can prove the sig
  • Related Articles

    [1]An Haoyang, He Debiao, Bao Zijian, Peng Cong, Luo Min. Ring Signature Based on the SM9 Digital Signature And Its Application in Blockchain Privacy Protection[J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554. DOI: 10.7544/issn1000-1239.202330265
    [2]Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
    [3]Zhang Wenfang, Wang Xiaomin, He Dake. An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature[J]. Journal of Computer Research and Development, 2012, 49(8): 1662-1667.
    [4]Wang Feng, Zhou Yousheng, Gu Lize, Yang Yixian. A Multi-Policies Threshold Signature Scheme with Group Verifiability[J]. Journal of Computer Research and Development, 2012, 49(3): 499-505.
    [5]Chen Shaozhen, Wang Wenqiang, Peng Shujuan. Efficient AttributeBased Ring Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(12).
    [6]Yu Jia, Kong Fanyu, Hao Rong, Li Daxing. A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2010, 47(4): 605-612.
    [7]Chen Hu, Zhu Changjie, Song Rushun. Efficient Certificateless Signature and Group Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(2): 231-237.
    [8]Li Huixian, Cai Wandong, Pang Liaojun. A Secure Dynamic Threshold Signature Scheme[J]. Journal of Computer Research and Development, 2007, 44(9): 1545-1549.
    [9]Peng Huaxi and Feng Dengguo. A Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2007, 44(4): 574-580.
    [10]Wu Zhongdong, Xie Weixin, Yu Jianping. A Security Enhancement Method of a Verifiable Threshold Signature Scheme Based on the Elliptic Curve[J]. Journal of Computer Research and Development, 2005, 42(4): 705-710.

Catalog

    Article views (617) PDF downloads (734) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return