Abstract

For the traditional threshold signature mechanism does not considers whether the nodes which generate part signature are trusted and the traditional signature strategy doesn’t do well in resisting internal attacks and external attacks and collusion attacks, so this paper presents a new threshold signature based on Trusted Platform Module (TPM), based on TPM the signature node first should finish the trust proof between it an other members who take part in the signature. Using a no-trusted center and the threshold of the signature policy, this strategy can track active attacks of the key management center and can prevent framing the key management center, this strategy takes into account the limited computing power TPM and has parameters of simple, beneficial full using of the limited computing power TPM.

Highlights

  • Rapid development of the computer and network technology has made human society into the information age

  • For the traditional threshold signature mechanism does not considers whether the nodes which generate part signature are trusted and the traditional signature strategy doesn’t do well in resisting internal attacks and external attacks and collusion attacks, so this paper presents a new threshold signature based on Trusted Platform Module (TPM), based on TPM the signature node first should finish the trust proof between it an other members who take part in the signature

  • In 1994 the Ham puts forward two threshold group signature based on discrete logarithm scheme [5,6], one scheme has a trusted center the other has no trusted center, but the traditional threshold signature mechanism does not considers whether the nodes which generate part signature are trusted, so this paper presents a new

Read more

Summary

Introduction

Rapid development of the computer and network technology has made human society into the information age. How to block network security hole, eliminate security concerns and protect the important or sensitive information has been paid highly attention by academics and even the whole society. If the important information or important operation is stored or finished by a single node, it will increase security risk. People may suspect that a given network server is secure and reliable, but it can still be reasonable to think that most servers are normal. On the assumption, trust entities can be structured, that most the network nodes of a group are secure and reliable. The important information storage or the execution of an important operation can be completed through cooperation of the members of the group. Threshold signature based on Trusted Platform Module (TPM), the signature node first prove itself is trusted, and it can generate signature, the scheme presented in this paper don’t need trusted center, and according to TPM limited ability, the scheme is based on the identity of the TPM, the scheme is based on discrete logarithm and don’t need Trusted center, comparing with traditional threshold signature this scheme has a higher efficiency

Shamir Threshold Scheme
Set up
Equations
The Generation of Signature Key
The Security of Private Key
No Forgery of Signature
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.