Threshold Group Signature Scheme with Privilege Subjects Based on ECC

This paper analyzes and studies of a threshold group signature scheme which is based on ElGamal type. In order to overcome the shortcomings of the scheme, a new threshold group signature scheme with privilege subjects based on ECC is proposed. The new scheme is able to prevent the fraud of key distr...

Full description

Saved in:
Bibliographic Details
Published in2010 International Conference on Communications and Intelligence Information Security pp. 84 - 87
Main Authors Xueming Wang, Yurong Dong
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.10.2010
Subjects
Online AccessGet full text
ISBN1424486491
9781424486496
DOI10.1109/ICCIIS.2010.64

Cover

Abstract This paper analyzes and studies of a threshold group signature scheme which is based on ElGamal type. In order to overcome the shortcomings of the scheme, a new threshold group signature scheme with privilege subjects based on ECC is proposed. The new scheme is able to prevent the fraud of key distribution center effectively. Only when the scheme satisfies (t, n) and (t 1 , n 1 ) threshold signature, can the valid signature be generated. Thus the scheme reached the property of threshold. The program also satisfies the properties of anonymity, unforgeability, trace ability, reversibility and it can resist collusion attacks too.
AbstractList This paper analyzes and studies of a threshold group signature scheme which is based on ElGamal type. In order to overcome the shortcomings of the scheme, a new threshold group signature scheme with privilege subjects based on ECC is proposed. The new scheme is able to prevent the fraud of key distribution center effectively. Only when the scheme satisfies (t, n) and (t 1 , n 1 ) threshold signature, can the valid signature be generated. Thus the scheme reached the property of threshold. The program also satisfies the properties of anonymity, unforgeability, trace ability, reversibility and it can resist collusion attacks too.
Author Yurong Dong
Xueming Wang
Author_xml – sequence: 1
  surname: Xueming Wang
  fullname: Xueming Wang
  email: xmwang1965@163.com
  organization: Comput. Sci. & Inf. Coll., Guizhou Univ., Guiyang, China
– sequence: 2
  surname: Yurong Dong
  fullname: Yurong Dong
  email: dyr1985@163.com
  organization: Comput. Sci. & Inf. Coll., Guizhou Univ., Guiyang, China
BookMark eNotjktLw0AURkdU0NZs3biZP5B6ZzKP3KWGtgYKCsm-ZJKbZiRNSh6K_96Arj44fBzOit10fUeMPQrYCAH4nCZJmmYbCQsw6ooFaGOwBrWSBuw1WwkllYqNQnHHgnH0DqSxRlvU92ybNwONTd9WfD_084Vn_tQV0zwQz8qGzsS__dTwj8F_-ZZOC53dJ5XTyF-LkSred3ybJA_sti7akYL_XbN8t82Tt_Dwvk-Tl0PoEaZQCTRFXUcxGivrpUgvEcoYwMq6SCK6qkRHUAjnwGmsJVXLFcAQxS7W0Zo9_Wk9ER0vgz8Xw89RG4kSIPoFNyVMRA
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCIIS.2010.64
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Law
EISBN 9780769542607
0769542603
EndPage 87
ExternalDocumentID 5629200
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-4196aff389672f486565746609d7b3299bdc9be0a1bb0b59f2ed967006ee8b853
IEDL.DBID RIE
ISBN 1424486491
9781424486496
IngestDate Wed Aug 27 02:44:51 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-4196aff389672f486565746609d7b3299bdc9be0a1bb0b59f2ed967006ee8b853
PageCount 4
ParticipantIDs ieee_primary_5629200
PublicationCentury 2000
PublicationDate 2010-Oct.
PublicationDateYYYYMMDD 2010-10-01
PublicationDate_xml – month: 10
  year: 2010
  text: 2010-Oct.
PublicationDecade 2010
PublicationTitle 2010 International Conference on Communications and Intelligence Information Security
PublicationTitleAbbrev ICCIIS
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib026765795
ssj0000452236
Score 1.4523163
Snippet This paper analyzes and studies of a threshold group signature scheme which is based on ElGamal type. In order to overcome the shortcomings of the scheme, a...
SourceID ieee
SourceType Publisher
StartPage 84
SubjectTerms ECC
Elliptic curve cryptography
Law
Polynomials
privilege subjects
secret sharing
threshold group signature
Title Threshold Group Signature Scheme with Privilege Subjects Based on ECC
URI https://ieeexplore.ieee.org/document/5629200
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7bTp78sYm_ycGj3dKmSZurZWMTJ8Im7Dby0lSK2A3XKfjXm6TtFPHgrSkU0vfK-8r73vcFoWsmJEhFqUd1QD1T_UIPAqo9FXORSqmAZVYoPH3g46fwbsEWLXSz08Jord3wme7bS8flpyu1ta2ygcFqYbLaRu0o5pVWq_l2Ah5xFtUaU1eFrVU45Y2WK-ah8BuLp3rNaxNHn4jBJEkmk1k16mXdB34cteKQZrSPps0eqwGTl_62hL76_GXf-N-XOEC9b00fftyh1SFq6eIIte_lRxcN5yahG8tDYdeKwrP8uTL8xDOT01eNbbfWPJ2_57bLgE21se2bDb41GJjiVYGHSdJD89Fwnoy9-ngFLxektPQvl1lmflh4FGQmIJYADTknIo2AGpSCVAnQRPoABJjIAp0KK-rhWsdgUP4YdYpVoU8QZgSUD74imfRDoEyGYUp8xSxVxqUOTlHXxmG5rgw0lnUIzv6-fY72HEXvJuYuUKd82-pLg_wlXLmUfwEqIabJ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1dS8MwFA1zPuiTH5v4bR58tFvafHR5tWysug1hFfY2kjSVIXbiOgV_vUnaThEffGsLhfbecE-4554TAK4pF1IojD2sA-yZ6kc8GWDtqR7jqRBK0swKhccTNnwkdzM6a4CbjRZGa-2Gz3THXjouP12qtW2VdQ1Wc5PVLbBNCSG0VGvVqydgIaNhpTJ1ddiahWNWq7l6jHC_Nnmq7lll4-gj3o2jKI6n5bCX9R_4cdiKw5rBHhjXX1mOmDx31oXsqM9fBo7__Y190P5W9cGHDV4dgIbOD8HWSHy0QD8xKV1ZJgq6ZhScLp5Ky084NVl90dD2a83bi_eF7TNAU29sA2cFbw0KpnCZw34UtUEy6CfR0KsOWPAWHBWWAGYiy8yWhYVBZgJiKVDCGOJpKLHBKZkqLjUSvpRIUp4FOuVW1sO07kmD80egmS9zfQwgRVL50lcoEz6RmApCUuQraskyJnRwAlo2DvPX0kJjXoXg9O_HV2BnmIxH81E8uT8Du46wd_Nz56BZvK31hdkHFPLSpf8LIByqFg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+International+Conference+on+Communications+and+Intelligence+Information+Security&rft.atitle=Threshold+Group+Signature+Scheme+with+Privilege+Subjects+Based+on+ECC&rft.au=Xueming+Wang&rft.au=Yurong+Dong&rft.date=2010-10-01&rft.pub=IEEE&rft.isbn=9781424486496&rft.spage=84&rft.epage=87&rft_id=info:doi/10.1109%2FICCIIS.2010.64&rft.externalDocID=5629200
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424486496/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424486496/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424486496/sc.gif&client=summon&freeimage=true