Academic Journals Database
Disseminating quality controlled scientific knowledge

A Threshold Signature Scheme Based on TPM

Author(s): Zhi-Hua Zhang | Si-Rong Zhang | Wen-Jin Yu | Jian-Jun Li | Bei Gong | Wei Jiang

Journal: International Journal of Communications, Network and System Sciences
ISSN 1913-3715

Volume: 04;
Issue: 10;
Start page: 622;
Date: 2011;
Original page

Keywords: TPM; Threshold | No Trusted Center | Bilinear Map

For the traditional threshold signature mechanism does not considers whether the nodes which generate part signature are trusted and the traditional signature strategy doesn’t do well in resisting internal attacks and external attacks and collusion attacks, so this paper presents a new threshold signature based on Trusted Platform Module (TPM), based on TPM the signature node first should finish the trust proof between it an other members who take part in the signature. Using a no-trusted center and the threshold of the signature policy, this strategy can track active attacks of the key management center and can prevent framing the key management center, this strategy takes into account the limited computing power TPM and has parameters of simple, beneficial full using of the limited computing power TPM.
Save time & money - Smart Internet Solutions     

Tango Jona
Tangokurs Rapperswil-Jona