An efficient lattice-based threshold signature scheme using multi-stage secret sharing

被引:6
|
作者
Pilaram, Hossein [1 ]
Eghlidos, Taraneh [2 ,3 ]
Toluee, Rahim [1 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
[3] Sharif Univ Technol, Tehran, Iran
基金
美国国家科学基金会;
关键词
Authentication;
D O I
10.1049/ise2.12007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi-party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper solutions. The authors address some important features like verifiability and being multi-stage to make it usable in various field of application. Here, the authors propose an anonymous threshold signature scheme based on the trapdoor function introduced by Micciancio and Peikert by sharing the private key using a lattice-based threshold multi-stage secret sharing (TMSSS) scheme. Then, the authors improve the previously proposed TMSSS scheme, in such a way that less public values are required to publish on the bulletin board which makes the scheme more efficient while preserving the security of the scheme based on the lattice hard problems. The proposed scheme inherits the desired features such as anonymity and verifiability from the improved TMSSS scheme. Furthermore, both schemes use simple matrix operations, which additionally increase the efficiency.
引用
收藏
页码:98 / 106
页数:9
相关论文
共 50 条
  • [41] A scheme for threshold multi-secret sharing
    Chan, CW
    Chang, CC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 1 - 14
  • [42] NSS: An NTRU lattice-based Signature Scheme
    Hoffstein, J
    Pipher, J
    Silverman, JH
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 211 - 228
  • [43] Cryptanalysis of the PEREGRINE Lattice-Based Signature Scheme
    Lin, Xiuhan
    Suzuki, Moeto
    Zhang, Shiduo
    Espitau, Thomas
    Yu, Yang
    Tibouchi, Mehdi
    Abe, Masayuki
    [J]. PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 387 - 412
  • [44] A Forward-Secure Threshold Signature Scheme Based on Multiplicative Secret Sharing
    Lu Dian-jun
    Li Xin-yan
    Wang Yun
    Zhang Bing-ru
    [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 476 - +
  • [45] Forward-secure threshold signature scheme based on polynomial secret sharing
    Lu, Dian-Jun
    Zhang, Bing-Ru
    Zhao, Hai-Xing
    [J]. Tongxin Xuebao/Journal on Communication, 2009, 30 (01): : 45 - 49
  • [46] The Lattice-Based Digital Signature Scheme qTESLA
    Alkim, Erdem
    Barreto, Paulo S. L. M.
    Bindel, Nina
    Kraemer, Juliane
    Longa, Patrick
    Ricardini, Jefferson E.
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 441 - 460
  • [47] Lattice-based online/offline signature scheme
    Xiang, Xin-Yin
    Li, Hui
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (03): : 117 - 120
  • [48] Efficient Multi-Signature Scheme Using Lattice
    Kansal, Meenakshi
    Singh, Amit Kumar
    Dutta, Ratna
    [J]. COMPUTER JOURNAL, 2022, 65 (09): : 2421 - 2429
  • [49] An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
    Chen, Dong
    Lu, Wei
    Xing, Weiwei
    Wang, Na
    [J]. IEEE ACCESS, 2019, 7 : 107104 - 107110
  • [50] Efficient Lattice-Based Ring Signature Scheme without Trapdoors for Machine Learning
    Ye, Qing
    Lang, Yongkang
    Zhao, Zongqu
    Chen, Qingqing
    Tang, Yongli
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022