Secret Sharing Based BLMQ Signature Generation

被引:3
|
作者
Long, Yihong [1 ]
Xiong, Feng [1 ]
机构
[1] Wuhan Univ Technol, Sch Informat Engn, Wuhan 430070, Peoples R China
来源
2020 4TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2020) | 2020年
关键词
Digital signature; identity based cryptography; BLMQ; secret sharing; SECURITY; FRAMEWORK;
D O I
10.1145/3377644.3377655
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
BLMQ is an identity based signature scheme named with the initial letters of the surnames of its proposers, Paulo S.L.M. Barreto, Benoit Libert, Noel McCullagh, and Jean-Jacques Quisquater. It can be used in various applications and systems. However when applied in an end device without dedicated cryptographic hardware, such as a mobile phone, the identity based private key is stored in the permanent storage and used in the volatile memory, which suffers from potential key leakage. When applied in a resource constrained end device, such as an industrial sensor or actuator, the end device cannot afford to perform the complicated signature computation of the BLMQ scheme. To address these issues, this paper proposes a number of secret sharing based BLMQ signature generation schemes, with which an end device shares the secret of a private key with the dedicated cryptographic devices or systems with strong security protection. The end device and the dedicated cryptographic devices or systems collaborate to generate the signature with their respective shares when signing a message. The leakage of the secret share in the end device does not lead to the compromise of the whole private key. Further with the proposed schemes, a resource constrained or limited end device can leverage the dedicated cryptographic devices or systems to perform complex signature computations. The proposed schemes have a promising application prospect.
引用
收藏
页码:6 / 12
页数:7
相关论文
共 50 条
  • [1] Quantum Signature Scheme Based on Secret Sharing
    Huang, Xiu-Ju
    Li, Zhen-Zhen
    Li, Zi-Chen
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (06)
  • [2] Quantum Signature Scheme Based on Secret Sharing
    Xiu-Ju Huang
    Zhen-Zhen Li
    Zi-Chen Li
    International Journal of Theoretical Physics, 61
  • [3] A novel quantum ring signature based on secret sharing
    Wei, Xing-Jia
    Lu, Dian-Jun
    Luo, Shuang-Shuang
    Li, Zhi-Hui
    MODERN PHYSICS LETTERS A, 2023, 38 (40)
  • [4] Threshold Signature Scheme Based on Modular Secret Sharing
    Xie, Qi
    Shen, Zhonghua
    Yu, Xiuyuan
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1003 - +
  • [5] Secret Sharing based SM2 Digital Signature Generation using Homomorphic Encryption
    Long, Yihong
    Cheng, Minyang
    2019 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2019), 2019, : 252 - 256
  • [6] A strong blind quantum signature protocol based on secret sharing
    Wen, Xiao-Jun
    Tian, Yuan
    Niu, Xia-Mu
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (03): : 720 - 724
  • [7] An Elliptic Curve Digital Signature Scheme Based on Proactive Secret Sharing
    Guo, Ping
    Zhang, Hong
    PROCEEDINGS OF THE 2009 WRI GLOBAL CONGRESS ON INTELLIGENT SYSTEMS, VOL II, 2009, : 523 - 525
  • [8] Simple threshold RSA signature scheme based on simple secret sharing
    Tang, SH
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 186 - 191
  • [9] Homomorphisms of secret sharing schemes: A tool for verifiable signature sharing
    Burmester, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 96 - 106
  • [10] An ID-based Block Ring Signature System for Secret Sharing of Data
    Patil, Kavita
    Wasnik, Chitra T.
    2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,