Full Text:   <2631>

CLC number: TP309

On-line Access: 

Received: 2003-03-30

Revision Accepted: 2003-06-22

Crosschecked: 0000-00-00

Cited: 0

Clicked: 4697

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
1. Reference List
Open peer comments

Journal of Zhejiang University SCIENCE A 2004 Vol.5 No.1 P.50-54


Verifiable threshold signature schemes against conspiracy attack

Author(s):  GAN Yuan-ju

Affiliation(s):  College of Information Science and Engineering, Central South University, Changsha 410075, China

Corresponding email(s):   yjgan@eyou.com

Key Words:  Cryptography, Threshold group signature, Conspiracy attack, Forgery attack

Share this article to: More

GAN Yuan-ju. Verifiable threshold signature schemes against conspiracy attack[J]. Journal of Zhejiang University Science A, 2004, 5(1): 50-54.

@article{title="Verifiable threshold signature schemes against conspiracy attack",
author="GAN Yuan-ju",
journal="Journal of Zhejiang University Science A",
publisher="Zhejiang University Press & Springer",

%0 Journal Article
%T Verifiable threshold signature schemes against conspiracy attack
%A GAN Yuan-ju
%J Journal of Zhejiang University SCIENCE A
%V 5
%N 1
%P 50-54
%@ 1869-1951
%D 2004
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2004.0050

T1 - Verifiable threshold signature schemes against conspiracy attack
A1 - GAN Yuan-ju
J0 - Journal of Zhejiang University Science A
VL - 5
IS - 1
SP - 50
EP - 54
%@ 1869-1951
Y1 - 2004
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2004.0050

In this study, the author has designed new verifiable (t,n) threshold untraceable signature schemes. The proposed schemes have the following properties: (1) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters, such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article


[1] Chor,B., Goldwasser,S., Micali,S. and Awerbuch, B.,1985. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. Proceeding of the 26th IEEE Symposium on Foundation of Computer Science, IEEE Computer Press, Washington, p.383-395.

[2] Desmedt,Y. and Frankel,Y.,1992. Shared Generation of Authenticators and Signatures. In:Feigenbaum J.ed., Advances in Cryptology-Crypto' 91 Proceedings, Springer-verlag, Berlin, p.457-469.

[3] Gan,Y.J. and Li,Q.H.,2003. A group oriented verifiable threshold signature scheme based on factorization. Journal of the China railway society, 25(3):69-72(in Chinese).

[4] Harn, L.,1994. Group-oriented (t,n) threshold digital signature scheme and multisignature. IEEE Proceedings, Computers and Digital Techniques, 141(5):307-313.

[5] Lee,N.Y., Hwang ,T. and Li,C.M.,2000. (t,n)threshold untraceable signatures. Journal of Information science and engingeering,16(6):835-846.

[6] Li,C.M., Hwang,T. and Lee,N.Y.,1995.(t,n) threshold signature schemes based on discrete logarithm. In: Cryptogy procedings of Eurocrypt'94,Springer-verlag, Berlin, p.191-200.

[7] Li, Z.C., Hui, L.C.K., Chow, K.P., Chong, C.F., Tsang, W.W. and Chan, H.W.,2001. Security of Wang et al.'s group-oriented (t,n) threshold signature schemes with traceable signers. Information Processing Letters, 80(6):295-298.

[8] Michels, M. and Horster, P.,1997. On the risk of disruption in several multiparty signature schemes. In: Cryptology-Crypto'96 Proceedings, Springer-verlag, Berlin, p.334-345.

[9] Tompa,M. and Woll,H.,1988.How to share a secret with cheaters. Journal of cryptology, 1(2):133-138.

[10] Tseng, Y.M. and Jan, J.K.,1999. Attacks on threshold signature scheme with traceable signers. Information Processing Letters, 71(1):1-4.

[11] Wang, C.T., Lin, C.H. and Chang, C.C.,1998. Threshold signature schemes with traceable signers in group communications. Computer Communications, 21(8):771-776.

[12] Wang ,G.L. and Qing, S.H.,2000. The weaknesses of some threshold group signature schemes. Journal of Software, 11(10):1326-1332(in Chinese).

[13] Wang, G.L.,Wang M.S., Ji ,Q.G. and Qing, S.H.,2001. Security limits of the LHL threshold group signature scheme. Journal of Computers, 24(9):897-902 (in Chinese).

Open peer comments: Debate/Discuss/Question/Opinion


Please provide your name, email address and a comment

Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE