Simple threshold RSA signature scheme based on simple secret sharing

被引:0
|
作者
Tang, SH [1 ]
机构
[1] S China Univ Technol, Sch Engn & Comp Sci, Guangzhou 510640, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new threshold RSA signature scheme is presented, which is based on a newly proposed simple secret sharing algorithm. The private key of RSA algorithm is divided into N pieces, and each piece is delivered to different participant. In order to digitally sign a message, each participant should calculate the partial signature for the message by using its own piece of shadow. Any K or greater than K participants out of N can combine the partial signatures to form a complete signature for the message. At the phase of signature combination, each participant's partial secret (shadow) is not necessary to expose to others and the RSA private key is not required to reconstruct, thus the secret of the private key will not be exposed. Besides, fast computation and simple operation are also the features of this scheme.
引用
收藏
页码:186 / 191
页数:6
相关论文
共 50 条
  • [1] Threshold Signature Scheme Based on Modular Secret Sharing
    Xie, Qi
    Shen, Zhonghua
    Yu, Xiuyuan
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1003 - +
  • [2] A Forward-secure Threshold Signature Scheme Based on Multiplicative Secret Sharing and Strong RSA Assumption
    Lu, Dian-jun
    Wang, Yu
    Zhang, Xiao-qin
    Ji, Lan-fen
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY (CIMNS 2017), 2017, : 326 - 330
  • [3] Simple and efficient threshold changeable secret sharing
    Harn, Lein
    Hsu, Chingfang
    Xia, Zhe
    Xu, Hang
    Zeng, Shuchang
    Pang, Fengling
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 77
  • [4] A Forward-Secure Threshold Signature Scheme Based on Multiplicative Secret Sharing
    Lu Dian-jun
    Li Xin-yan
    Wang Yun
    Zhang Bing-ru
    [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 476 - +
  • [5] Forward-secure threshold signature scheme based on polynomial secret sharing
    Lu, Dian-Jun
    Zhang, Bing-Ru
    Zhao, Hai-Xing
    [J]. Tongxin Xuebao/Journal on Communication, 2009, 30 (01): : 45 - 49
  • [6] A SIMPLE AND SECURE QUANTUM SECRET SHARING SCHEME BASED ON PRODUCT STATES
    Xu Juan
    Chen Hanwu
    Liu Zhihao
    [J]. INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2012, 10 (03)
  • [7] Quantum Signature Scheme Based on Secret Sharing
    Huang, Xiu-Ju
    Li, Zhen-Zhen
    Li, Zi-Chen
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (06)
  • [8] Quantum Signature Scheme Based on Secret Sharing
    Xiu-Ju Huang
    Zhen-Zhen Li
    Zi-Chen Li
    [J]. International Journal of Theoretical Physics, 61
  • [9] An Improved Threshold Proxy Signature Scheme Based on RSA
    Dong, Xuedong
    Gao, Yuan
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 629 - 632
  • [10] An improved threshold proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Tang, FL
    [J]. PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 901 - 907