A provably secure threshold signature scheme based on DDH assumption

被引:0
|
作者
Lin, Xiaodong [1 ]
机构
[1] Univ Ontario, Fac Business & Informat Technol, Inst Technol, Oshawa, ON L1H 7K4, Canada
关键词
threshold signature; provable security; DDH assumption; TRACEABLE SIGNERS; AUTHENTICATION; NETWORKS; ATTACKS;
D O I
10.1002/sec.203
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threshold signature is an important cryptographic primitive, which was introduced by Desmedt and Frankel in 1991. In a (t, n) threshold signature scheme, a group secret key is distributed among n parties. Later, any t or more parties can use their shares of secret key to generate valid signatures on behalf of the group, while any t - 1 or less parties cannot. Over the past years, many excellent threshold signature schemes have been proposed, but few of them provide the provable security proof. Therefore, in this paper, based on Decisional Diffie-Hellman (DDH) assumption, we present a new (t, n) threshold signature scheme and use the techniques from provable security to analyze its security. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:678 / 684
页数:7
相关论文
共 50 条
  • [21] Provably secure robust threshold partial blind signature
    Cao Zhenfu
    Zhu Haojin
    Lu Rongxing
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (05): : 604 - 615
  • [22] A Provably Secure Certificate-based Signature Scheme with Bilinear Pairings
    Zhang Jianhong
    Chen Hua
    Yang Yixian
    [J]. ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 1271 - +
  • [23] IBUOV, a Provably Secure Identity-Based UOV Signature Scheme
    Shen, Wuqiang
    Tang, Shaohua
    Xu, Lingling
    [J]. 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 388 - 395
  • [24] Provably secure robust threshold partial blind signature
    Zhenfu Cao
    Haojin Zhu
    Rongxing Lu
    [J]. Science in China Series F: Information Sciences, 2006, 49 : 604 - 615
  • [25] Provably Secure Proxy Multi-Signature Scheme Based on ECC
    Tiwari, Namita
    Padhye, Sahadeo
    He, Debiao
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (02): : 199 - 204
  • [26] Provably secure certificate-based signature scheme without pairings
    Li, Jiguo
    Wang, Zhiwei
    Zhang, Yichen
    [J]. INFORMATION SCIENCES, 2013, 233 : 313 - 320
  • [27] Provably secure randomized blind signature scheme based on bilinear pairing
    Fan, Chun-I
    Sun, Wei-Zhe
    Huang, Vincent Shi-Ming
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 285 - 293
  • [28] Provably secure multi-signature scheme based on the standard SM2 signature scheme
    Xiao, Yuchen
    Zhang, Lei
    Yang, Yafang
    Wu, Wei
    Ning, Jianting
    Huang, Xinyi
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [29] An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme
    Li, Fagen
    Yu, Yong
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 547 - 551
  • [30] Provably secure proxy signature scheme from factorization
    Yu, Yong
    Mu, Yi
    Susilo, Willy
    Sun, Ying
    Ji, Yafu
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1160 - 1168