Simple threshold RSA signature scheme based on simple secret sharing

被引:0
|
作者
Tang, SH [1 ]
机构
[1] S China Univ Technol, Sch Engn & Comp Sci, Guangzhou 510640, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new threshold RSA signature scheme is presented, which is based on a newly proposed simple secret sharing algorithm. The private key of RSA algorithm is divided into N pieces, and each piece is delivered to different participant. In order to digitally sign a message, each participant should calculate the partial signature for the message by using its own piece of shadow. Any K or greater than K participants out of N can combine the partial signatures to form a complete signature for the message. At the phase of signature combination, each participant's partial secret (shadow) is not necessary to expose to others and the RSA private key is not required to reconstruct, thus the secret of the private key will not be exposed. Besides, fast computation and simple operation are also the features of this scheme.
引用
收藏
页码:186 / 191
页数:6
相关论文
共 50 条
  • [31] Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET Using Verifiable Secret Sharing Scheme
    Sarkar, S.
    Kisku, B.
    Misra, S.
    Obaidat, M. S.
    2009 IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, 2009, : 258 - +
  • [32] An Image Watermarking Scheme using Threshold Based Secret Sharing
    Latha, S. Bhargavi
    Reddy, D. Venkata
    Damodaram, A.
    2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, : 619 - 623
  • [33] Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation
    Zhang, En
    Zhu, Jun-Zhe
    Li, Gong-Li
    Chang, Jian
    Li, Yu
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [34] A Novel Connection Correlation Scheme Based on Threshold Secret Sharing
    Chen, Yonghong
    Zhang, Ning
    Tian, Hui
    Wang, Tian
    Cai, Yiqiao
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (12) : 2414 - 2417
  • [35] A Threshold Secret Sharing Scheme Based on Cross-Product
    Qu, Juan
    Zhang, Jian-zhong
    PROCEEDINGS OF 2010 ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2010, : 1015 - 1017
  • [36] Pairing-Based Dynamic Threshold Secret Sharing Scheme
    Huang, Ye
    Yang, Geng
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [37] Improvement of Shoup's threshold RSA signature scheme
    Wang, Gui-Lin
    Qing, Si-Han
    Wang, Ming-Sheng
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (09): : 1046 - 1050
  • [38] A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    Hwang, MS
    Lu, EJL
    Lin, IC
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (06) : 1552 - 1560
  • [39] An Improved (t,n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem
    Wang, Yuping
    Hu, Lishuan
    Yu, Xin
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 567 - 570
  • [40] Crypanalysis of kuo and chen's threshold proxy signature scheme based on the RSA
    Li, Fengying
    Xue, Qingshui
    Cao, Zhenfu
    INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 815 - +