Threshold Signature Scheme without Using Polynomial Interpolation
نویسندگان
چکیده
In a (t, n) secret sharing scheme (SS), the secret is shared among n shareholders in such a way that (a) with t or more than t shares can recover the secret, and (b) with fewer than t shares cannot obtain the secret. The threshold signature scheme is an application that extends the SS to a digital signature scheme. In a threshold signature scheme, any t or more than t group members can represent the group to generate a group signature; but fewer than t group members cannot generate a group signature. So far, most threshold signature schemes are based on the linear polynomial. In other words, these threshold signature schemes need to overcome the problem of polynomial interpolation. In this paper, we propose a threshold signature scheme based on the Chinese Remainder Theorem (CRT). We describe how to set up the system by a trusted group manager initially and generate pairs of public and private keys for group members. Since our proposed scheme is based on the CRT, there is no polynomial interpolation. The security of our proposed threshold signature scheme is based on the difficulty of solving the discrete logarithm problem.
منابع مشابه
Attacks on a threshold proxy signature scheme based on the RSA cryptosystem
Recently, Hwang et al. propose an efficient (t, n) threshold proxy signature scheme in which the original signer can authorize n proxy signers such that only the cooperation of t or more of them is able to generate a proxy signature on behalf of the original signer. Their scheme is based on the RSA cryptosystem. They claim that any t out of n proxy signers cannot derive the original signer’s pr...
متن کاملIdentity Authentication and Key Agreement Schemes for Ad Hoc Networks
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this paper, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using t...
متن کاملThreshold Schemes with Hierarchical Information
Consider the problem of n trustees any k of which are needed to be in agreement to make an action x In addition if only k are in agreement we would like to ensure that the action can not be made Solutions to this type of problem have been independently proposed by Shamir Sha and Blakley Bla The solution is commonly referred to as a threshold scheme Numerous uses for threshold schemes are presen...
متن کاملLossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation
This study proposes a novel multi-image threshold sharing scheme based on Chinese remainder theorem and Lagrange interpolation. The exceptional property of the scheme is its ability to retrieve any secret image without recovering all the other images. Therefore, it works efficiently and reduces computation cost in case it needs to recover only one image from shares. In term of capacity, the sch...
متن کاملA Threshold Digital Signature Issuing Scheme without Secret Communication
This paper describes an efficient (k, n) threshold digital signature scheme. In the scheme, k out of n signers cooperate to issue a signature without using trusted center. No secret communication is required among signers across the network. As a base scheme, Pedersen's verifiable secret sharing (VSS) is applied to generate shared secret keys in such a way that no secret communication is requir...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2016