A Rational Threshold Signature Model and Protocol Based on Different Permissions

This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret...

Full description

Saved in:
Bibliographic Details
Main Authors: Bojun Wang, Cheng Cai, Quan Zhou
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:Journal of Applied Mathematics
Online Access:http://dx.doi.org/10.1155/2014/176085
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849403620455350272
author Bojun Wang
Cheng Cai
Quan Zhou
author_facet Bojun Wang
Cheng Cai
Quan Zhou
author_sort Bojun Wang
collection DOAJ
description This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.
format Article
id doaj-art-84d2dad6f2f94d5faead4f4aefa5ea57
institution Kabale University
issn 1110-757X
1687-0042
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series Journal of Applied Mathematics
spelling doaj-art-84d2dad6f2f94d5faead4f4aefa5ea572025-08-20T03:37:12ZengWileyJournal of Applied Mathematics1110-757X1687-00422014-01-01201410.1155/2014/176085176085A Rational Threshold Signature Model and Protocol Based on Different PermissionsBojun Wang0Cheng Cai1Quan Zhou2School of Electronic and Computer Engineering, Peking University, Shenzhen 518055, ChinaSchool of Electronic and Computer Engineering, Peking University, Shenzhen 518055, ChinaCollege of Computer Science and Technology, Beijing University of Technology, Beijing 100124, ChinaThis paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.http://dx.doi.org/10.1155/2014/176085
spellingShingle Bojun Wang
Cheng Cai
Quan Zhou
A Rational Threshold Signature Model and Protocol Based on Different Permissions
Journal of Applied Mathematics
title A Rational Threshold Signature Model and Protocol Based on Different Permissions
title_full A Rational Threshold Signature Model and Protocol Based on Different Permissions
title_fullStr A Rational Threshold Signature Model and Protocol Based on Different Permissions
title_full_unstemmed A Rational Threshold Signature Model and Protocol Based on Different Permissions
title_short A Rational Threshold Signature Model and Protocol Based on Different Permissions
title_sort rational threshold signature model and protocol based on different permissions
url http://dx.doi.org/10.1155/2014/176085
work_keys_str_mv AT bojunwang arationalthresholdsignaturemodelandprotocolbasedondifferentpermissions
AT chengcai arationalthresholdsignaturemodelandprotocolbasedondifferentpermissions
AT quanzhou arationalthresholdsignaturemodelandprotocolbasedondifferentpermissions
AT bojunwang rationalthresholdsignaturemodelandprotocolbasedondifferentpermissions
AT chengcai rationalthresholdsignaturemodelandprotocolbasedondifferentpermissions
AT quanzhou rationalthresholdsignaturemodelandprotocolbasedondifferentpermissions