Indexed by:
Abstract:
Threshold signature has security and robustness, so more and more scholars pay close attention to it. Aiming at the disadvantage that it cannot prevent conspiracy attack, this paper makes full use of tracing set and other technologies, proposes a threshold signature model which can withstand the conspiracy attack and resolves conspiracy attack problem successfully. Moreover, the model can prevent replay attack, has forward security and without the support of the trusted centre. At last, this paper proves that in the standard model, the model is unforgeable under adaptive chosen message attack. Copyright © 2019 Inderscience Enterprises Ltd.
Keyword:
Reprint Author's Address:
Email:
Source :
International Journal of Wireless and Mobile Computing
ISSN: 1741-1084
Year: 2019
Issue: 3
Volume: 17
Page: 300-306
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count: 2
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 5