Provably secure distributed Schnorr signatures and a (t, n) threshold scheme for implicit certificates

被引:0
|
作者
Stinson, DR
Strobl, R
机构
[1] Certicom Corp, Mississauga, ON L4W 5L1, Canada
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
[3] Swiss Fed Inst Technol, Dept Comp Sci, CH-9478 Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a (t, n) threshold digital signature scheme, t out of n signers must co-operate to issue a signature. We present an efficient and robust (t, n) threshold version of Schnorr's signature scheme. We prove it to be as secure as Schnorr's signature scheme, i.e., existentially unforgeable under adaptively chosen message attacks. The signature scheme is then incorporated into a (t,n) threshold scheme for implicit certificates. We prove the implicit certificate scheme to be as secure as the distributed Schnorr signature scheme.
引用
收藏
页码:417 / 434
页数:18
相关论文
共 50 条
  • [21] Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
    Odelu, Vanga
    Das, Ashok Kumar
    Kumari, Saru
    Huang, Xinyi
    Wazid, Mohammad
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 : 74 - 88
  • [22] A fully distributed proactively secure threshold-multisignature scheme
    van der Merwe, Johann
    Dawoud, Dawoud S.
    McDonald, Stephen
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (04) : 562 - 575
  • [23] A secure and efficient (t, n) threshold verifiable multi-secret sharing scheme
    Huang, MJ
    Zhang, JZ
    Xie, SC
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 532 - 537
  • [24] Provably Secure Server-Assisted Verification Threshold Proxy Re-signature Scheme
    Lv, Guoning
    Lei, Yanfang
    Hu, Mingsheng
    Cheng, Yage
    Gong, Bei
    Fu, Junjun
    [J]. TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 44 - 57
  • [25] Efficient and provably secure multi-receiver signcryption scheme using implicit certificate in edge computing
    Yu, Xiaopeng
    Zhao, Wei
    Tang, Dianhua
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 126
  • [26] Secure(t,n) shared signature scheme
    Shi, Ronghua
    Hu, Xiangling
    [J]. Tiedao Xuebao/Journal of the China Railway Society, 2000, 22 (03): : 65 - 68
  • [27] Secure(t,n) shared signature scheme
    [J]. 2000, Sci Publ House (22):
  • [28] Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures
    Kokoris-Kogias, Eleftherios
    Malkhi, Dahlia
    Spiegelman, Alexander
    [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1751 - 1767
  • [29] An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    [J]. 2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 293 - 298
  • [30] Cheater identification in (t,n) threshold scheme
    Tan, KJ
    Zhu, HW
    Gu, SJ
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 762 - 765