How to construct efficient on-line/off-line threshold signature schemes through the simulation approach

被引:1
|
作者
Gao, Chong-zhi [1 ]
Wei, Baodian [2 ]
Xie, Dongqing [1 ]
Tang, Chunming [3 ]
机构
[1] Guangzhou Univ, Guangzhou Higher Educ Mega Ctr, Coll Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Dept Elect & Commun Engn, Guangzhou 510275, Guangdong, Peoples R China
[3] Guangzhou Univ, Inst Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
来源
关键词
signature schemes; threshold signature schemes; on-line/off-line; ROBUST; RSA;
D O I
10.1002/cpe.1438
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An on-line/off-line threshold signature (OTS) scheme is a distributed cryptosystem in which a group of players jointly generate a signature for a message and use the on-line/off-line technique to improve the efficiency of signing. An OTS scheme can be applied to large-scaled distributed data storage systems and can highly improve the efficiency of writing files. There are two approaches to construct an ordinary threshold signature scheme: the direct approach and the simulation approach. Owing to its simplicity, people tend to use the simulation approach, in which the security of a threshold signature scheme is reduced to the security of its underlying (and simpler) signature scheme. The security proof in this approach is based on a theorem that guarantees the validity of the security reduction-we call this theorem the simulation theorem. However, the simulation theorem (and thus the simulation approach) for an ordinary threshold signature scheme cannot be applied to the on-line/off-line cases, because partial signature exposure problems might occur in these cases. This paper presents a simulation theorem for the on-line/off-line cases, where the security of an OTS scheme is reduced to the security of a so-called divisible on-line/off-line signature scheme. This provides a theoretical basis for constructing an OTS scheme through the simulation approach. Furthermore, through this approach, we present a concrete OTS scheme, which is efficient and its security proof is simple. Copyright (c) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:1351 / 1372
页数:22
相关论文
共 50 条
  • [1] A New Efficient On-line/Off-line Threshold Signature Scheme
    Wu Chunhui
    Chen Xiaofeng
    Long Dongyang
    CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (02): : 321 - 324
  • [2] Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families
    Harn, Lein
    Hsin, Wen-Jung
    Lin, Changlu
    COMPUTER JOURNAL, 2010, 53 (09): : 1478 - 1484
  • [3] An Efficient On-Line/Off-Line Signature Scheme without Random Oracles
    Joye, Marc
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 98 - 107
  • [4] Generic on-line/off-line threshold signatures
    Crutchfield, Chris
    Molnar, David
    Turner, David
    Wagner, David
    PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 58 - 74
  • [5] Generic on-line/off-line threshold signatures
    Wei Fushan
    Ma Chuangui
    Huang Genxun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4753 - +
  • [6] Improved on-line/off-line threshold signatures
    Bresson, Emmanuel
    Catalano, Dario
    Gennaro, Rosario
    PUBLIC KEY CRYPTOGRAPHY - PKC 2007, 2007, 4450 : 217 - +
  • [7] Efficient generic on-line/off-line (threshold) signatures without key exposure
    Chen, Xiaofeng
    Zhang, Fangguo
    Tian, Haibo
    Wei, Baodian
    Susilo, Willy
    Mu, Yi
    Lee, Hyunrok
    Kim, Kwangjo
    INFORMATION SCIENCES, 2008, 178 (21) : 4192 - 4203
  • [8] Adaptively Secure On-line/Off-line Threshold Signatures
    Gao, Chong-zhi
    Tang, Chunming
    Yao, Zheng-an
    Xie, Dongqing
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 508 - +
  • [9] Signature verification based on fusion of on-line and off-line kernels
    Mottl, Vadim
    Lange, Mikhail
    Sulimova, Valentina
    Yermakov, Alexey
    19TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOLS 1-6, 2008, : 3326 - 3329
  • [10] Identity Based On-Line/Off-Line Signature With Designated Verifier
    Jiang, Yi
    Li, Jianping
    Xiong, Anping
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2015, 21 (03): : 433 - 443