A Rational Threshold Signature Model and Protocol Based on Different Permissions
This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2014-01-01
|
| Series: | Journal of Applied Mathematics |
| Online Access: | http://dx.doi.org/10.1155/2014/176085 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849403620455350272 |
|---|---|
| author | Bojun Wang Cheng Cai Quan Zhou |
| author_facet | Bojun Wang Cheng Cai Quan Zhou |
| author_sort | Bojun Wang |
| collection | DOAJ |
| description | This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security. |
| format | Article |
| id | doaj-art-84d2dad6f2f94d5faead4f4aefa5ea57 |
| institution | Kabale University |
| issn | 1110-757X 1687-0042 |
| language | English |
| publishDate | 2014-01-01 |
| publisher | Wiley |
| record_format | Article |
| series | Journal of Applied Mathematics |
| spelling | doaj-art-84d2dad6f2f94d5faead4f4aefa5ea572025-08-20T03:37:12ZengWileyJournal of Applied Mathematics1110-757X1687-00422014-01-01201410.1155/2014/176085176085A Rational Threshold Signature Model and Protocol Based on Different PermissionsBojun Wang0Cheng Cai1Quan Zhou2School of Electronic and Computer Engineering, Peking University, Shenzhen 518055, ChinaSchool of Electronic and Computer Engineering, Peking University, Shenzhen 518055, ChinaCollege of Computer Science and Technology, Beijing University of Technology, Beijing 100124, ChinaThis paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.http://dx.doi.org/10.1155/2014/176085 |
| spellingShingle | Bojun Wang Cheng Cai Quan Zhou A Rational Threshold Signature Model and Protocol Based on Different Permissions Journal of Applied Mathematics |
| title | A Rational Threshold Signature Model and Protocol Based on Different Permissions |
| title_full | A Rational Threshold Signature Model and Protocol Based on Different Permissions |
| title_fullStr | A Rational Threshold Signature Model and Protocol Based on Different Permissions |
| title_full_unstemmed | A Rational Threshold Signature Model and Protocol Based on Different Permissions |
| title_short | A Rational Threshold Signature Model and Protocol Based on Different Permissions |
| title_sort | rational threshold signature model and protocol based on different permissions |
| url | http://dx.doi.org/10.1155/2014/176085 |
| work_keys_str_mv | AT bojunwang arationalthresholdsignaturemodelandprotocolbasedondifferentpermissions AT chengcai arationalthresholdsignaturemodelandprotocolbasedondifferentpermissions AT quanzhou arationalthresholdsignaturemodelandprotocolbasedondifferentpermissions AT bojunwang rationalthresholdsignaturemodelandprotocolbasedondifferentpermissions AT chengcai rationalthresholdsignaturemodelandprotocolbasedondifferentpermissions AT quanzhou rationalthresholdsignaturemodelandprotocolbasedondifferentpermissions |