A Threshold Digital Signature Issuing Scheme without Secret Communication
نویسندگان
چکیده
This paper describes an efficient (k, n) threshold digital signature scheme. In the scheme, k out of n signers cooperate to issue a signature without using trusted center. No secret communication is required among signers across the network. As a base scheme, Pedersen's verifiable secret sharing (VSS) is applied to generate shared secret keys in such a way that no secret communication is required in the following signature issuing phase. Then, Nyberg-Ruepple or ElGamal type digital signature scheme is employed which uses only linear combination of two shared secrets when applied to the (k, n) threshold scenario. It is considered that the (k, n) threshold scheme without using encryption is meaningful in an environment where strongly enciphered message cannot be sent across the network. The proposed (k, n) threshold digital signature scheme is proved to be as secure as the Nyberg-Ruepple or ElGamal type digital signature against chosen message attacks. It is discussed that the proposed VSS is also applicable to encryption. An application to (k, n) threshold sign-encryption is also presented.
منابع مشابه
Simulatable and secure certificate-based threshold signature without pairings
We propose the notion and define the security model of a certificate-based threshold signature. The model is a general model that allows both the master secret key and user secret keys to be determined and distributed to the corresponding participators. Furthermore, the model can be easily converted into an identity-based (ID-based) threshold signature model to solve the key escrow problem and ...
متن کاملThreshold Signature Scheme without Using Polynomial Interpolation
In a (t, n) secret sharing scheme (SS), the secret is shared among n shareholders in such a way that (a) with t or more than t shares can recover the secret, and (b) with fewer than t shares cannot obtain the secret. The threshold signature scheme is an application that extends the SS to a digital signature scheme. In a threshold signature scheme, any t or more than t group members can represen...
متن کاملCryptanalysis of Threshold-Multisignature schemes
In [1], Li et al. proposed a new type of signature scheme, called the (t, n) thresholdmutisignature scheme. The first one needs a mutually trusted share distribution center (SDC) while the second one does not. In this paper, we present a security analysis on their second schemes. We point out that their second threshold-multisignature scheme is vulnerable to universal forgery by an insider atta...
متن کاملRepairing Efficient Threshold Group Signature Scheme
To enhance the efficiency of threshold group signature schemes, Yu and Chen, recently, proposed an efficient threshold group signature scheme. By using elliptic curves, the proposed scheme can use short secret key and reduces the load of signature verification. However, in this paper we find that there are many ambiguities in the proposed scheme. The verifiers cannot verify valid signatures, wh...
متن کاملA Novel Multi-factor ID-based Designated Verifier Signature scheme
In a classic digital signature scheme, the global community is capable of verifying a signature. In a designated verifier scheme (DVS), only the designated verifier has this capability. In a classic DVS scheme the signer themselves “designates” the entity that will have the capability of verifying their signature. In a pure identity-based signature scheme a Trusted Authority is introduced, and ...
متن کامل