A provably secure threshold signature scheme based on DDH assumption

被引:0
|
作者
Lin, Xiaodong [1 ]
机构
[1] Univ Ontario, Fac Business & Informat Technol, Inst Technol, Oshawa, ON L1H 7K4, Canada
关键词
threshold signature; provable security; DDH assumption; TRACEABLE SIGNERS; AUTHENTICATION; NETWORKS; ATTACKS;
D O I
10.1002/sec.203
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threshold signature is an important cryptographic primitive, which was introduced by Desmedt and Frankel in 1991. In a (t, n) threshold signature scheme, a group secret key is distributed among n parties. Later, any t or more parties can use their shares of secret key to generate valid signatures on behalf of the group, while any t - 1 or less parties cannot. Over the past years, many excellent threshold signature schemes have been proposed, but few of them provide the provable security proof. Therefore, in this paper, based on Decisional Diffie-Hellman (DDH) assumption, we present a new (t, n) threshold signature scheme and use the techniques from provable security to analyze its security. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:678 / 684
页数:7
相关论文
共 50 条
  • [1] A Provably Secure Proxy Signature Scheme with Multiple Threshold Values Based on Elliptic Curve
    Shao, Zuhua
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 58 - 61
  • [2] A new provably secure signature scheme
    Tan, CH
    Yi, X
    Siew, CK
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (10) : 2633 - 2635
  • [3] A provably secure blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2007, 4484 : 171 - +
  • [4] Provably secure and ID-based group signature scheme
    Chen, ZW
    Huang, JW
    Huang, DR
    Zhang, JH
    Wang, YM
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 384 - 388
  • [5] A provably secure short signature scheme based on discrete logarithms
    Shao, Zuhua
    [J]. INFORMATION SCIENCES, 2007, 177 (23) : 5432 - 5440
  • [6] A provably secure code-based concurrent signature scheme
    Asaar, Maryam Rajabzadeh
    Ameri, Mohammad Hassan
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    [J]. IET INFORMATION SECURITY, 2018, 12 (01) : 34 - 41
  • [7] A Provably Secure Signature Scheme based on Factoring and Discrete Logarithms
    Shao, Zuhua
    Gao, Yipeng
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (04): : 1553 - 1558
  • [8] A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME
    Chen, Yu-Chi
    Liu, Chao-Liang
    Horng, Gwoboa
    Chen, Kuo-Chang
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5557 - 5569
  • [9] An Efficient and Provably Secure Proxy Signature Scheme
    Zhang, Jianhong
    Xu, Min
    Su, Xiuna
    [J]. MECHATRONICS AND INTELLIGENT MATERIALS, PTS 1 AND 2, 2011, 211-212 : 876 - +
  • [10] Provably secure proxy blind signature scheme
    Kim, Young-Seol
    Chang, Jik-Hyun
    [J]. ISM 2006: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2006, : 998 - +