A Forward-secure Threshold Signature Scheme Based on Multiplicative Secret Sharing and Strong RSA Assumption

被引:0
作者
Lu, Dian-jun [1 ]
Wang, Yu [1 ]
Zhang, Xiao-qin [2 ]
Ji, Lan-fen [3 ]
机构
[1] Qinghai Normal Univ, Dept Math, Xining, Qinghai, Peoples R China
[2] Qinghai Univ, Financial & Econ Coll, Xining, Qinghai, Peoples R China
[3] Qinghai Normal Univ, Foreign Language Dept, Xining, Qinghai, Peoples R China
来源
2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY (CIMNS 2017) | 2017年
关键词
Digital signature; Forward security; Threshold cryptography; Multiplicative secret sharing; Strong RSA assumption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new forward-secure threshold digital signature scheme which based on multiplicative secret sharing and strong RSA assumption is put forward in this paper. The scheme has the following property: It have the property of forward security, even if more than the threshold numbers of players are compromised, it is not possible to forge the signature which is related to the past. This property is achieved while keeping the public key fixed and updating the secret keys at regular intervals. Assuming that factoring is hard, we proved that this scheme is security in the random oracle model.
引用
收藏
页码:326 / 330
页数:5
相关论文
共 11 条
[1]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P441
[2]  
[Anonymous], 1997, P 1997 ACM C COMP CO
[3]  
[Anonymous], 2006, J ELECT INFORM TECHN
[4]  
Bellare M, 2003, LECT NOTES COMPUT SC, V2612, P1
[5]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[6]  
Itkis G., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P332
[7]  
Kozlov A., 2002, INT C SEC COMM NETW, V2576, P241
[8]   Distributed key generation protocol with a new complaint management strategy [J].
Neji, Wafa ;
Blibech, Kaouther ;
Ben Rajeb, Narjes .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) :4585-4595
[9]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[10]  
Wang Hao-you, 2002, Journal of Software, V13, P1729