Simple threshold RSA signature scheme based on simple secret sharing

被引:0
|
作者
Tang, SH [1 ]
机构
[1] S China Univ Technol, Sch Engn & Comp Sci, Guangzhou 510640, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new threshold RSA signature scheme is presented, which is based on a newly proposed simple secret sharing algorithm. The private key of RSA algorithm is divided into N pieces, and each piece is delivered to different participant. In order to digitally sign a message, each participant should calculate the partial signature for the message by using its own piece of shadow. Any K or greater than K participants out of N can combine the partial signatures to form a complete signature for the message. At the phase of signature combination, each participant's partial secret (shadow) is not necessary to expose to others and the RSA private key is not required to reconstruct, thus the secret of the private key will not be exposed. Besides, fast computation and simple operation are also the features of this scheme.
引用
收藏
页码:186 / 191
页数:6
相关论文
共 50 条
  • [21] A block based Secret Sharing Scheme using Hilbert Matrix and RSA
    Thalapathiraj, S.
    Fathimal, P. Mohamed
    Baskaran, B.
    11TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND APPLICATIONS, 2019, 2112
  • [22] A Threshold RSA Signature Scheme with Traceable Signers
    Shi, Runhua
    Zhong, Hong
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 647 - 649
  • [23] An efficient threshold RSA digital signature scheme
    Xu, QL
    Chen, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 25 - 34
  • [24] A threshold RSA signature scheme with traceable signers
    Shi, Runhua
    Zhong, Hong
    Huang, Liusheng
    Journal of Computational Information Systems, 2009, 5 (04): : 1143 - 1146
  • [25] Key Sharing Scheme based on One Weighted Threshold Secret Sharing
    Yoo, SeongMin
    Park, PyungKoo
    Shin, JinSeop
    Ryou, JaeCheo
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 317 - 320
  • [26] Blockchain Data Sharing Query Scheme based on Threshold Secret Sharing
    Chen, Lu
    Zhang, Xin
    Sun, Zhixin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [27] Dynamic threshold secret sharing scheme
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    Qinghua Daxue Xuebao, 2006, 1 (102-105):
  • [28] An efficient lattice-based threshold signature scheme using multi-stage secret sharing
    Pilaram, Hossein
    Eghlidos, Taraneh
    Toluee, Rahim
    IET INFORMATION SECURITY, 2021, 15 (01) : 98 - 106
  • [29] Improvement of threshold RSA signature scheme based on Chinese Remainder Theorem
    Xu, Fu
    Ma, Jing-Jin
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2015, 37 (10): : 2495 - 2500
  • [30] A Simple Visual Secret Sharing Scheme Employing Particle Swarm Optimization
    Das, Surya Sarathi
    Das Sharma, Kaushik
    Bera, Jitendra Nath
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, ENERGY & COMMUNICATION (CIEC), 2014, : 646 - 649