Provably secure distributed Schnorr signatures and a (t, n) threshold scheme for implicit certificates

被引:0
|
作者
Stinson, DR
Strobl, R
机构
[1] Certicom Corp, Mississauga, ON L4W 5L1, Canada
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
[3] Swiss Fed Inst Technol, Dept Comp Sci, CH-9478 Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a (t, n) threshold digital signature scheme, t out of n signers must co-operate to issue a signature. We present an efficient and robust (t, n) threshold version of Schnorr's signature scheme. We prove it to be as secure as Schnorr's signature scheme, i.e., existentially unforgeable under adaptively chosen message attacks. The signature scheme is then incorporated into a (t,n) threshold scheme for implicit certificates. We prove the implicit certificate scheme to be as secure as the distributed Schnorr signature scheme.
引用
收藏
页码:417 / 434
页数:18
相关论文
共 50 条
  • [1] Provably secure blind threshold signatures based on discrete logarithm
    Lei, CL
    Juang, WS
    Yu, PL
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2002, 18 (01) : 23 - 39
  • [2] Provably Secure Code-Based Threshold Ring Signatures
    Dallot, Leonard
    Vergnaud, Damien
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2009, 5921 : 222 - +
  • [3] Provably secure robust optimistic fair exchange of distributed signatures
    Wang, Yujue
    Wu, Qianhong
    Wong, Duncan S.
    Qin, Bo
    Mao, Jian
    Ding, Yong
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 29 - 39
  • [4] Practical (fully) distributed signatures provably secure in the standard model
    Wang, Yujue
    Wong, Duncan S.
    Wu, Qianhong
    Chow, Sherman S. M.
    Qin, Bo
    Liu, Jianwei
    Ding, Yong
    [J]. THEORETICAL COMPUTER SCIENCE, 2015, 595 : 143 - 158
  • [5] A secure steganography scheme based on (N, t) threshold
    Fan, K
    Kou, WD
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 536 - 539
  • [7] Provably secure identity-based threshold unsigncryption scheme
    Yang, Bo
    Yu, Yong
    Li, Fagen
    Sun, Ying
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +
  • [8] A new forward-secure threshold signature scheme based on Schnorr cryptosystem
    Cheng, Guosheng
    Yun, Cuilan
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 599 - +
  • [9] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin (The National Key Lab of Integrated Service Networks
    [J]. Journal of Electronics(China), 2006, (05) : 731 - 735
  • [10] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin The National Key Lab of Integrated Service Networks Xidian Univ Xian China
    [J]. JournalofElectronics., 2006, (05) - 735