Message Block Sharing and Its Application: Lattice-based Threshold Signature Scheme
نویسندگان
چکیده
منابع مشابه
Lattice-based Threshold Signature with Message Block Sharing
In this paper, we introduce an interesting tool to construct the k-out-of-N threshold signature schemes, which we call as message block sharing. To achieve our goal, we first separate an original message with large size into multiple message blocks with random size. Then, we give a partial number of message blocks to N signers with combinatorial approach. We propose an example scheme with our t...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملPost-Quantum Attribute-Based Signatures from Lattice Assumptions
Attribute based signature schemes (ABS) constitute important and powerful primitives when it comes to protecting the privacy of the user’s identity and signing information. More specifically, ABS schemes provide the advantage of anonymously signing a message once a given policy is satisfied. As opposed to other related privacy preserving signatures, the verifier is not able to deduce from the s...
متن کاملA Threshold Digital Signature Issuing Scheme without Secret Communication
This paper describes an efficient (k, n) threshold digital signature scheme. In the scheme, k out of n signers cooperate to issue a signature without using trusted center. No secret communication is required among signers across the network. As a base scheme, Pedersen's verifiable secret sharing (VSS) is applied to generate shared secret keys in such a way that no secret communication is requir...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014