Threshold Group Signature Scheme with Privilege Subjects Based on ECC
This paper analyzes and studies of a threshold group signature scheme which is based on ElGamal type. In order to overcome the shortcomings of the scheme, a new threshold group signature scheme with privilege subjects based on ECC is proposed. The new scheme is able to prevent the fraud of key distr...
        Saved in:
      
    
          | Published in | 2010 International Conference on Communications and Intelligence Information Security pp. 84 - 87 | 
|---|---|
| Main Authors | , | 
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        01.10.2010
     | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 1424486491 9781424486496  | 
| DOI | 10.1109/ICCIIS.2010.64 | 
Cover
| Abstract | This paper analyzes and studies of a threshold group signature scheme which is based on ElGamal type. In order to overcome the shortcomings of the scheme, a new threshold group signature scheme with privilege subjects based on ECC is proposed. The new scheme is able to prevent the fraud of key distribution center effectively. Only when the scheme satisfies (t, n) and (t 1 , n 1 ) threshold signature, can the valid signature be generated. Thus the scheme reached the property of threshold. The program also satisfies the properties of anonymity, unforgeability, trace ability, reversibility and it can resist collusion attacks too. | 
    
|---|---|
| AbstractList | This paper analyzes and studies of a threshold group signature scheme which is based on ElGamal type. In order to overcome the shortcomings of the scheme, a new threshold group signature scheme with privilege subjects based on ECC is proposed. The new scheme is able to prevent the fraud of key distribution center effectively. Only when the scheme satisfies (t, n) and (t 1 , n 1 ) threshold signature, can the valid signature be generated. Thus the scheme reached the property of threshold. The program also satisfies the properties of anonymity, unforgeability, trace ability, reversibility and it can resist collusion attacks too. | 
    
| Author | Yurong Dong Xueming Wang  | 
    
| Author_xml | – sequence: 1 surname: Xueming Wang fullname: Xueming Wang email: xmwang1965@163.com organization: Comput. Sci. & Inf. Coll., Guizhou Univ., Guiyang, China – sequence: 2 surname: Yurong Dong fullname: Yurong Dong email: dyr1985@163.com organization: Comput. Sci. & Inf. Coll., Guizhou Univ., Guiyang, China  | 
    
| BookMark | eNotjktLw0AURkdU0NZs3biZP5B6ZzKP3KWGtgYKCsm-ZJKbZiRNSh6K_96Arj44fBzOit10fUeMPQrYCAH4nCZJmmYbCQsw6ooFaGOwBrWSBuw1WwkllYqNQnHHgnH0DqSxRlvU92ybNwONTd9WfD_084Vn_tQV0zwQz8qGzsS__dTwj8F_-ZZOC53dJ5XTyF-LkSred3ybJA_sti7akYL_XbN8t82Tt_Dwvk-Tl0PoEaZQCTRFXUcxGivrpUgvEcoYwMq6SCK6qkRHUAjnwGmsJVXLFcAQxS7W0Zo9_Wk9ER0vgz8Xw89RG4kSIPoFNyVMRA | 
    
| ContentType | Conference Proceeding | 
    
| DBID | 6IE 6IL CBEJK RIE RIL  | 
    
| DOI | 10.1109/ICCIIS.2010.64 | 
    
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Law | 
    
| EISBN | 9780769542607 0769542603  | 
    
| EndPage | 87 | 
    
| ExternalDocumentID | 5629200 | 
    
| Genre | orig-research | 
    
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL  | 
    
| ID | FETCH-LOGICAL-i90t-4196aff389672f486565746609d7b3299bdc9be0a1bb0b59f2ed967006ee8b853 | 
    
| IEDL.DBID | RIE | 
    
| ISBN | 1424486491 9781424486496  | 
    
| IngestDate | Wed Aug 27 02:44:51 EDT 2025 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-i90t-4196aff389672f486565746609d7b3299bdc9be0a1bb0b59f2ed967006ee8b853 | 
    
| PageCount | 4 | 
    
| ParticipantIDs | ieee_primary_5629200 | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2010-Oct. | 
    
| PublicationDateYYYYMMDD | 2010-10-01 | 
    
| PublicationDate_xml | – month: 10 year: 2010 text: 2010-Oct.  | 
    
| PublicationDecade | 2010 | 
    
| PublicationTitle | 2010 International Conference on Communications and Intelligence Information Security | 
    
| PublicationTitleAbbrev | ICCIIS | 
    
| PublicationYear | 2010 | 
    
| Publisher | IEEE | 
    
| Publisher_xml | – name: IEEE | 
    
| SSID | ssib026765795 ssj0000452236  | 
    
| Score | 1.4523163 | 
    
| Snippet | This paper analyzes and studies of a threshold group signature scheme which is based on ElGamal type. In order to overcome the shortcomings of the scheme, a... | 
    
| SourceID | ieee | 
    
| SourceType | Publisher | 
    
| StartPage | 84 | 
    
| SubjectTerms | ECC Elliptic curve cryptography Law Polynomials privilege subjects secret sharing threshold group signature  | 
    
| Title | Threshold Group Signature Scheme with Privilege Subjects Based on ECC | 
    
| URI | https://ieeexplore.ieee.org/document/5629200 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7bTp78sYm_ycGj3dKmSZurZWMTJ8Im7Dby0lSK2A3XKfjXm6TtFPHgrSkU0vfK-8r73vcFoWsmJEhFqUd1QD1T_UIPAqo9FXORSqmAZVYoPH3g46fwbsEWLXSz08Jord3wme7bS8flpyu1ta2ygcFqYbLaRu0o5pVWq_l2Ah5xFtUaU1eFrVU45Y2WK-ah8BuLp3rNaxNHn4jBJEkmk1k16mXdB34cteKQZrSPps0eqwGTl_62hL76_GXf-N-XOEC9b00fftyh1SFq6eIIte_lRxcN5yahG8tDYdeKwrP8uTL8xDOT01eNbbfWPJ2_57bLgE21se2bDb41GJjiVYGHSdJD89Fwnoy9-ngFLxektPQvl1lmflh4FGQmIJYADTknIo2AGpSCVAnQRPoABJjIAp0KK-rhWsdgUP4YdYpVoU8QZgSUD74imfRDoEyGYUp8xSxVxqUOTlHXxmG5rgw0lnUIzv6-fY72HEXvJuYuUKd82-pLg_wlXLmUfwEqIabJ | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1dS8MwFA1zPuiTH5v4bR58tFvafHR5tWysug1hFfY2kjSVIXbiOgV_vUnaThEffGsLhfbecE-4554TAK4pF1IojD2sA-yZ6kc8GWDtqR7jqRBK0swKhccTNnwkdzM6a4CbjRZGa-2Gz3THXjouP12qtW2VdQ1Wc5PVLbBNCSG0VGvVqydgIaNhpTJ1ddiahWNWq7l6jHC_Nnmq7lll4-gj3o2jKI6n5bCX9R_4cdiKw5rBHhjXX1mOmDx31oXsqM9fBo7__Y190P5W9cGHDV4dgIbOD8HWSHy0QD8xKV1ZJgq6ZhScLp5Ky084NVl90dD2a83bi_eF7TNAU29sA2cFbw0KpnCZw34UtUEy6CfR0KsOWPAWHBWWAGYiy8yWhYVBZgJiKVDCGOJpKLHBKZkqLjUSvpRIUp4FOuVW1sO07kmD80egmS9zfQwgRVL50lcoEz6RmApCUuQraskyJnRwAlo2DvPX0kJjXoXg9O_HV2BnmIxH81E8uT8Du46wd_Nz56BZvK31hdkHFPLSpf8LIByqFg | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+International+Conference+on+Communications+and+Intelligence+Information+Security&rft.atitle=Threshold+Group+Signature+Scheme+with+Privilege+Subjects+Based+on+ECC&rft.au=Xueming+Wang&rft.au=Yurong+Dong&rft.date=2010-10-01&rft.pub=IEEE&rft.isbn=9781424486496&rft.spage=84&rft.epage=87&rft_id=info:doi/10.1109%2FICCIIS.2010.64&rft.externalDocID=5629200 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424486496/lc.gif&client=summon&freeimage=true | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424486496/mc.gif&client=summon&freeimage=true | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424486496/sc.gif&client=summon&freeimage=true |