Provably secure distributed Schnorr signatures and a (t, n) threshold scheme for implicit certificates

被引:0
|
作者
Stinson, DR
Strobl, R
机构
[1] Certicom Corp, Mississauga, ON L4W 5L1, Canada
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
[3] Swiss Fed Inst Technol, Dept Comp Sci, CH-9478 Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a (t, n) threshold digital signature scheme, t out of n signers must co-operate to issue a signature. We present an efficient and robust (t, n) threshold version of Schnorr's signature scheme. We prove it to be as secure as Schnorr's signature scheme, i.e., existentially unforgeable under adaptively chosen message attacks. The signature scheme is then incorporated into a (t,n) threshold scheme for implicit certificates. We prove the implicit certificate scheme to be as secure as the distributed Schnorr signature scheme.
引用
收藏
页码:417 / 434
页数:18
相关论文
共 50 条
  • [31] New secure distributed secret sharing scheme of n product
    Chen, Zhen-Hua
    Li, Shun-Dong
    Wang, Bao-Cang
    Li, Ji-Liang
    Liu, Xin
    [J]. Tongxin Xuebao/Journal on Communications, 2014, 35 (11): : 139 - 145
  • [32] Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction
    Lu, Xingye
    Zhang, Zhenfei
    Au, Man Ho
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 813 - 820
  • [33] A Fully Adaptively Secure Threshold Signature Scheme Based on Dual-Form Signatures Technology
    Gan, Yuanju
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [34] Fair (t, n) threshold secret sharing scheme
    Tian, Youliang
    Ma, Jianfeng
    Peng, Changgen
    Jiang, Qi
    [J]. IET INFORMATION SECURITY, 2013, 7 (02) : 106 - 112
  • [35] A Fair (t,n) Threshold Secret Sharing Scheme
    Xing, Minhong
    Li, Wenmin
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 140 - 143
  • [36] A New (t, n)-Threshold Secret Sharing Scheme
    Tang, Chunming
    Yao, Zheng-an
    [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 920 - +
  • [37] An enhanced (t,n) threshold directed signature scheme
    Hwang, Jung Yeon
    Kim, Hyoung Joong
    Lee, Dong Hoon
    Song, Boyeon
    [J]. INFORMATION SCIENCES, 2014, 275 : 284 - 292
  • [38] A scheme for (t, n) threshold secret image sharing
    Chan, Chao-Wen
    Chang, Thin-Chen
    [J]. IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 619 - +
  • [39] A provably secure t-out-of-n oblivious transfer mechanism based on blind signature
    Chang, Chin-Chen
    Cheng, Ting-Fang
    [J]. Journal of Information Hiding and Multimedia Signal Processing, 2014, 5 (01): : 1 - 12
  • [40] UNCONDITIONALLY SECURE FAIR (t, n)-SECRET SHARING SCHEME
    Al Mahmoud, Qassim
    Besoul, Khaldoun
    Alhalaybeh, Ayman
    [J]. ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 127 - 143