z-logo
open-access-imgOpen Access
A Rational Threshold Signature Model and Protocol Based on Different Permissions
Author(s) -
Bojun Wang,
Cheng Cai,
Quan Zhou
Publication year - 2014
Publication title -
journal of applied mathematics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.307
H-Index - 43
eISSN - 1687-0042
pISSN - 1110-757X
DOI - 10.1155/2014/176085
Subject(s) - computer science , verifiable secret sharing , signature (topology) , cheating , computer security , secret sharing , protocol (science) , digital signature , scheme (mathematics) , key (lock) , theoretical computer science , cryptography , mathematics , set (abstract data type) , programming language , medicine , psychology , social psychology , hash function , mathematical analysis , geometry , alternative medicine , pathology
This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom