A provably secure threshold signature scheme based on DDH assumption

被引:0
|
作者
Lin, Xiaodong [1 ]
机构
[1] Univ Ontario, Fac Business & Informat Technol, Inst Technol, Oshawa, ON L1H 7K4, Canada
关键词
threshold signature; provable security; DDH assumption; TRACEABLE SIGNERS; AUTHENTICATION; NETWORKS; ATTACKS;
D O I
10.1002/sec.203
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threshold signature is an important cryptographic primitive, which was introduced by Desmedt and Frankel in 1991. In a (t, n) threshold signature scheme, a group secret key is distributed among n parties. Later, any t or more parties can use their shares of secret key to generate valid signatures on behalf of the group, while any t - 1 or less parties cannot. Over the past years, many excellent threshold signature schemes have been proposed, but few of them provide the provable security proof. Therefore, in this paper, based on Decisional Diffie-Hellman (DDH) assumption, we present a new (t, n) threshold signature scheme and use the techniques from provable security to analyze its security. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:678 / 684
页数:7
相关论文
共 50 条
  • [41] Provably secure strong designated verifier signature scheme based on coding theory
    Shooshtari, Masoumeh Koochak
    Ahmadian-Attari, Mahmoud
    Aref, Mohammad Reza
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (07)
  • [42] Provably secure certificate- based key- insulated signature scheme
    Li, Jiguo
    Du, Haiting
    Zhang, Yichen
    Li, Tao
    Zhang, Yuexin
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (08): : 1546 - 1560
  • [43] An efficient and provably secure identity-based signature scheme in the standard model
    Li, Ji-Guo
    Jiang, Ping-Jin
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (11): : 2130 - 2136
  • [44] AN EFFICIENT AND PROVABLY SECURE ID-BASED SIGNATURE SCHEME WITH BATCH VERIFICATIONS
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    Wu, Jui-Di
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (11A): : 3911 - 3922
  • [45] Provably Secure Lattice-Based Self-Certified Signature Scheme
    Yang, Qiang
    Li, Daofeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [46] Provably secure threshold signature schemes without random oracles
    State Key Laboratory of Information Security, Graduate University, Chinese Academy of Sciences, Beijing 100039, China
    [J]. Jisuanji Xuebao, 2006, 9 (1636-1640):
  • [47] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [48] A SECURE THRESHOLD GROUP SIGNATURE SCHEME
    Wang Xiaoming Fu Fangwei(School of Mathematics Science
    [J]. Journal of Electronics(China), 2003, (04) : 274 - 278
  • [49] Secure threshold proxy signature scheme
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    [J]. Dianzi Yu Xinxi Xuebao, 2006, 7 (1308-1311):
  • [50] Provably Secure Threshold-Based ABE Scheme Without Bilinear Map
    Arijit Karati
    Ruhul Amin
    G. P. Biswas
    [J]. Arabian Journal for Science and Engineering, 2016, 41 : 3201 - 3213