A traceable threshold signature scheme with multiple signing policies

  • Jun Shao
  • , Zhenfu Cao*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

12 Scopus citations

Abstract

In recent years, a great deal of work has been done on threshold signature schemes and many excellent schemes have been proposed. In Eurocrypt'94, Li et al. [Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. In: Advances in Cryptology-Proceedings of EUROCRYPT 94; 1994. p. 413-9] proposed a threshold signature scheme with traceability, which allows us to trace back to find the signer without revealing the secret keys. And in 2001, Lee [Threshold signature scheme with multiple signing policies. IEE Proc Comput Digit Tech 2001;148(2):95-9] proposed a threshold signature scheme with multiple signing policies, which allows multiple secret keys to be shared among a group of users, and each secret key has its specific threshold value. In this paper, based on these schemes, we present a traceable threshold signature scheme with multiple signing policies, which not only inherits their properties, but also fixes their weaknesses.

Original languageEnglish
Pages (from-to)201-206
Number of pages6
JournalComputers and Security
Volume25
Issue number3
DOIs
StatePublished - May 2006
Externally publishedYes

Keywords

  • Multi-secret
  • Multiple signing policies
  • Signature schemes
  • Threshold cryptography
  • Traceability

Fingerprint

Dive into the research topics of 'A traceable threshold signature scheme with multiple signing policies'. Together they form a unique fingerprint.

Cite this