An Efficient Threshold Signature Scheme

被引:0
|
作者
Zhang Chengli [1 ]
Tang Chunming [1 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou, Guangdong, Peoples R China
关键词
Threshold cryptography; distributed key generation; threshold signatures; SECURE; GENERATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Gao et al utilized the Pederson's distributed key generation scheme, which was based on Feldman's verifiable secret sharing protocol, to construct a threshold signature scheme. But later a flaw of Pederson's distributed key generation scheme was found by Gennaro et al, namely the key is not uniformly generated in the key space with a malicious adversary. In this paper, we use a new distributed key generation scheme from bivariate symmetric polynomial to construct a threshold signature scheme, which is satisfied the requirement of security and secrecy.
引用
收藏
页码:85 / 87
页数:3
相关论文
共 50 条
  • [1] Efficient Threshold Signature Scheme
    Aboud, Sattar J.
    AL-Fayoumi, Mohammad
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (01) : 112 - 116
  • [2] An efficient threshold group signature scheme
    Hu, Chengyu
    Li, Daxing
    [J]. IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 338 - +
  • [3] An efficient threshold group signature scheme
    Chen, TS
    Hsiao, TC
    Chen, TL
    [J]. TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B13 - B16
  • [4] An efficient threshold group signature scheme
    Yu, YL
    Chen, TS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 362 - 371
  • [5] An efficient implementation of a threshold RSA signature scheme
    King, B
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 382 - 393
  • [6] A Secure and Efficient Threshold Group Signature Scheme
    Zhang, Yansheng
    Wang, Xueming
    Qiu, Gege
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED MECHANICS, MECHATRONICS AND INTELLIGENT SYSTEMS (AMMIS2015), 2016, : 567 - 573
  • [7] An efficient threshold RSA digital signature scheme
    Xu, QL
    Chen, TS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 25 - 34
  • [8] An efficient multivariate threshold ring signature scheme
    Duong, Dung H.
    Tran, Ha T. N.
    Susilo, Willy
    Le Van Luyen
    [J]. COMPUTER STANDARDS & INTERFACES, 2021, 74
  • [9] A NOVEL EFFICIENT THRESHOLD PROXY SIGNATURE SCHEME
    Zhang, Zhong
    Xu, Qiu-Liang
    [J]. 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 375 - 377
  • [10] An Efficient Threshold Key-Insulated Signature Scheme
    陈剑洪
    龙宇
    陈克非
    王永涛
    李祥学
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 658 - 662