Lattice-based Threshold Signature with Message Block Sharing

نویسندگان

  • Rakyong Choi
  • Kwangjo Kim
چکیده

In this paper, we introduce an interesting tool to construct the k-out-of-N threshold signature schemes, which we call as message block sharing. To achieve our goal, we first separate an original message with large size into multiple message blocks with random size. Then, we give a partial number of message blocks to N signers with combinatorial approach. We propose an example scheme with our tool by implementing this to the lattice-based group signature scheme by Gordon et al. in ASIACRYPT 2010.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

Post-Quantum Attribute-Based Signatures from Lattice Assumptions

Attribute based signature schemes (ABS) constitute important and powerful primitives when it comes to protecting the privacy of the user’s identity and signing information. More specifically, ABS schemes provide the advantage of anonymously signing a message once a given policy is satisfied. As opposed to other related privacy preserving signatures, the verifier is not able to deduce from the s...

متن کامل

A General Threshold Signature and Authenticated Encryption Scheme Based on ElGamal System

Based on ElGamal system, a group-oriented threshold signature and authenticated encryption scheme was put forward. After being signed by a signer group employing ) , ( n t threshold signature scheme, the message m was transmitted to a particular verifier group, and then the signature was verified through the cooperation of k ones from the verifier group with l members. Similarly, a general auth...

متن کامل

Certificateless threshold signature scheme from bilinear maps

A (t,n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with nmembers. In contrast to the traditional public key cryptography based on public key infrastructure (PKI) and identity-based public key cryptography (IDPKC), certificateless public key cryptography (CL-PKC) offers useful properties as it does not require any certificates to ensure ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013