How to construct efficient on-line/off-line threshold signature schemes through the simulation approach

被引:1
|
作者
Gao, Chong-zhi [1 ]
Wei, Baodian [2 ]
Xie, Dongqing [1 ]
Tang, Chunming [3 ]
机构
[1] Guangzhou Univ, Guangzhou Higher Educ Mega Ctr, Coll Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Dept Elect & Commun Engn, Guangzhou 510275, Guangdong, Peoples R China
[3] Guangzhou Univ, Inst Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
来源
关键词
signature schemes; threshold signature schemes; on-line/off-line; ROBUST; RSA;
D O I
10.1002/cpe.1438
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An on-line/off-line threshold signature (OTS) scheme is a distributed cryptosystem in which a group of players jointly generate a signature for a message and use the on-line/off-line technique to improve the efficiency of signing. An OTS scheme can be applied to large-scaled distributed data storage systems and can highly improve the efficiency of writing files. There are two approaches to construct an ordinary threshold signature scheme: the direct approach and the simulation approach. Owing to its simplicity, people tend to use the simulation approach, in which the security of a threshold signature scheme is reduced to the security of its underlying (and simpler) signature scheme. The security proof in this approach is based on a theorem that guarantees the validity of the security reduction-we call this theorem the simulation theorem. However, the simulation theorem (and thus the simulation approach) for an ordinary threshold signature scheme cannot be applied to the on-line/off-line cases, because partial signature exposure problems might occur in these cases. This paper presents a simulation theorem for the on-line/off-line cases, where the security of an OTS scheme is reduced to the security of a so-called divisible on-line/off-line signature scheme. This provides a theoretical basis for constructing an OTS scheme through the simulation approach. Furthermore, through this approach, we present a concrete OTS scheme, which is efficient and its security proof is simple. Copyright (c) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:1351 / 1372
页数:22
相关论文
共 50 条
  • [21] Versatile BIST: An integrated approach to on-line/off-line BIST
    Karri, R
    Mukherjee, N
    INTERNATIONAL TEST CONFERENCE 1998, PROCEEDINGS, 1998, : 910 - 917
  • [22] Integrating Off-line and On-line Schedulers
    Rasconi, Riccardo
    Policella, Nicola
    Cesta, Amedeo
    ECAI 2006, PROCEEDINGS, 2006, 141 : 845 - 846
  • [23] On-line/off-line digital signatures
    Even, S
    Goldreich, O
    Micali, S
    JOURNAL OF CRYPTOLOGY, 1996, 9 (01) : 35 - 67
  • [24] PHENIX on-line and off-line computing
    Adler, SS
    Chujo, T
    Desmond, EJ
    Ewell, L
    Ghosh, TK
    Haggerty, JS
    Ichihara, T
    Jacak, BV
    Johnson, SC
    Kehayias, HJ
    Lauret, J
    Maguire, CF
    Messer, M
    Mioduszewski, S
    Mitchell, JT
    Morrison, DP
    Ojha, ID
    Pinkenburg, CH
    Pollack, M
    Pope, K
    Purschke, ML
    Sorensen, S
    Sourikova, I
    Thomas, TL
    Velkovsky, M
    Watanabe, Y
    Witzig, C
    Yokkaichi, S
    Zajc, WA
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 2003, 499 (2-3): : 593 - 602
  • [25] Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results
    Emmanuel Bresson
    Dario Catalano
    Mario Di Raimondo
    Dario Fiore
    Rosario Gennaro
    International Journal of Information Security, 2013, 12 : 439 - 465
  • [26] A unified approach for off-line and on-line testing of VLSI systems
    Lala, PK
    Yang, S
    Busaba, F
    1996 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI SYSTEMS, PROCEEDINGS, 1996, : 195 - 203
  • [27] An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    Gao, Shengnan
    Chen, Hua
    Geng, Qin
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 588 - +
  • [28] Realistic Synthetic Off-Line Signature Generation Based on Synthetic On-Line Data
    Ferrer, Miguel A.
    Diaz-Cabrera, Moises
    Morales, Aythami
    Galbally, Javier
    Gomez-Barrero, Marta
    2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
  • [29] A secure and efficient on-line/off-line group key distribution protocol
    Meng, Keju
    Miao, Fuyou
    Yu, Yue
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (07) : 1601 - 1620
  • [30] Efficient generic on-line/off-line signatures without key exposure
    Chen, Xiaofeng
    Zhang, Fangguo
    Susilo, Willy
    Mu, Yi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 18 - 30