A Fully Adaptively Secure Threshold Signature Scheme Based on Dual-Form Signatures Technology

被引:1
|
作者
Gan, Yuanju [1 ]
机构
[1] Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2021/6697295
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In (t, n) threshold signature schemes, any subset of t participants out of n can produce a valid signature, but any fewer than t participants cannot. Meanwhile, a threshold signature scheme should remain robust and unforgeable against up to t - 1 corrupted participants. This nonforgeability property is that even an adversary breaking into up to t - 1 participants should be unable to generate signatures on its own. Existential unforgeability against adaptive chosen message attacks is widely considered as a standard security notion for digital signature, and threshold signature should also follow this accordingly. However, there are two special attack models in a threshold signature scheme: one is the static corruption attack and the other is the adaptive corruption attack Since the adaptive corruption model appears to better capture real threats, designing and proving threshold signature schemes secure in the adaptive corruption model has been focused on in recent years. If a threshold signature is secure under adaptive chosen message attack and adaptive corruption attack, we say it is fully adaptively secure. In this paper, based on the dual pairing vector spaces technology, we construct a threshold signature scheme and use Gerbush et al.'s dual-form signatures technology to prove our scheme, which is fully adaptively secure in the standard model, and then compare it to other schemes in terms of the efficiency and computation.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Adaptively Secure Threshold Signature Scheme in the Standard Model
    Wang, Zecheng
    Qian, Haifeng
    Li, Zhibin
    [J]. INFORMATICA, 2009, 20 (04) : 591 - 612
  • [2] Leakage-Resilient Dual-Form Signatures
    Huang, Jianye
    Huang, Qiong
    Susilo, Willy
    [J]. COMPUTER JOURNAL, 2018, 61 (08): : 1216 - 1227
  • [3] A SECURE THRESHOLD PROXY SIGNATURE SCHEME
    Xu, Feng
    Zhou, Wenhuan
    Liu, Xuan
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
  • [4] A SECURE THRESHOLD GROUP SIGNATURE SCHEME
    Wang Xiaoming Fu Fangwei(School of Mathematics Science
    [J]. Journal of Electronics(China), 2003, (04) : 274 - 278
  • [5] Secure threshold proxy signature scheme
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    [J]. Dianzi Yu Xinxi Xuebao, 2006, 7 (1308-1311):
  • [6] A provably secure threshold signature scheme based on DDH assumption
    Lin, Xiaodong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (06) : 678 - 684
  • [7] Adaptively Secure On-line/Off-line Threshold Signatures
    Gao, Chong-zhi
    Tang, Chunming
    Yao, Zheng-an
    Xie, Dongqing
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 508 - +
  • [8] A Secure and Efficient Threshold Group Signature Scheme
    Zhang, Yansheng
    Wang, Xueming
    Qiu, Gege
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED MECHANICS, MECHATRONICS AND INTELLIGENT SYSTEMS (AMMIS2015), 2016, : 567 - 573
  • [9] A secure threshold Paillier proxy signature scheme
    Ting, Pei-yih
    Huang, Xiao-wei
    Wu, Jun-hui
    Hseu, Chia-huei
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (03): : 206 - 213
  • [10] A new forward secure threshold signature scheme
    Yu, Jia
    Kong, Fanyu
    Hao, Rong
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1243 - 1246