Threshold Signature Scheme without Using Polynomial Interpolation

نویسندگان

  • Lein Harn
  • Feng Wang
چکیده

In a (t, n) secret sharing scheme (SS), the secret is shared among n shareholders in such a way that (a) with t or more than t shares can recover the secret, and (b) with fewer than t shares cannot obtain the secret. The threshold signature scheme is an application that extends the SS to a digital signature scheme. In a threshold signature scheme, any t or more than t group members can represent the group to generate a group signature; but fewer than t group members cannot generate a group signature. So far, most threshold signature schemes are based on the linear polynomial. In other words, these threshold signature schemes need to overcome the problem of polynomial interpolation. In this paper, we propose a threshold signature scheme based on the Chinese Remainder Theorem (CRT). We describe how to set up the system by a trusted group manager initially and generate pairs of public and private keys for group members. Since our proposed scheme is based on the CRT, there is no polynomial interpolation. The security of our proposed threshold signature scheme is based on the difficulty of solving the discrete logarithm problem.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attacks on a threshold proxy signature scheme based on the RSA cryptosystem

Recently, Hwang et al. propose an efficient (t, n) threshold proxy signature scheme in which the original signer can authorize n proxy signers such that only the cooperation of t or more of them is able to generate a proxy signature on behalf of the original signer. Their scheme is based on the RSA cryptosystem. They claim that any t out of n proxy signers cannot derive the original signer’s pr...

متن کامل

Identity Authentication and Key Agreement Schemes for Ad Hoc Networks

Identity authentication and key agreement schemes play significant role in ad hoc networks. In this paper, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using t...

متن کامل

Threshold Schemes with Hierarchical Information

Consider the problem of n trustees any k of which are needed to be in agreement to make an action x In addition if only k are in agreement we would like to ensure that the action can not be made Solutions to this type of problem have been independently proposed by Shamir Sha and Blakley Bla The solution is commonly referred to as a threshold scheme Numerous uses for threshold schemes are presen...

متن کامل

Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation

This study proposes a novel multi-image threshold sharing scheme based on Chinese remainder theorem and Lagrange interpolation. The exceptional property of the scheme is its ability to retrieve any secret image without recovering all the other images. Therefore, it works efficiently and reduces computation cost in case it needs to recover only one image from shares. In term of capacity, the sch...

متن کامل

A Threshold Digital Signature Issuing Scheme without Secret Communication

This paper describes an efficient (k, n) threshold digital signature scheme. In the scheme, k out of n signers cooperate to issue a signature without using trusted center. No secret communication is required among signers across the network. As a base scheme, Pedersen's verifiable secret sharing (VSS) is applied to generate shared secret keys in such a way that no secret communication is requir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2016