Abstract
A forward secure threshold signature scheme from bilinear pairings is presented in this paper. Compared with previous forward secure threshold signature schemes against malicious adversary, this scheme needs very few interactions and is very efficient. A new interactive zero-knowledge proof protocol is presented and its non-interactive version can verify the validity of part signatures in this scheme. At last, we prove that the scheme is robust and forward secure in the random oracle model.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
Shoup, V.: Practical threshold signature. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207–220. Springer, Heidelberg (2000)
Bellare, M., Miner, S.: A forward-secure digital signature scheme. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431–448. Springer, Heidelberg (1999)
Itkis, G., Reyzin, L.: Forward-secure signatures with optimal signing and verifying. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 499–514. Springer, Heidelberg (2001)
Kang, B.G., Park, J.H., Halm, S.G.: A new forward secure signature scheme. Cryptology ePrint Archive, Report 2004/183 (2004)
Abdalla, M., Miner, S., Namprempre, C.: Forward-secure threshold signature schemes. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 441–456. Springer, Heidelberg (2001)
Tzeng, Z.J., Tzeng, W.G.: Robust forward signature schemes with proactive security. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 264–276. Springer, Heidelberg (2001)
Wang, H., Qiu, G., Feng, D., Xiao, G.: Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A(3), 822–825 (2006)
Cheng-Kang Chu, Li-Shan Liu, Wen-Guey Tzeng. A threshold GQ signature scheme. Cryptology ePrint Archive, Report 2003/016 (2002)
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems, Advances in Cryptology-Eurocrypt’99. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 295–310. Springer, Heidelberg (1999)
Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography, Advances in Cryptology-Asiacrypt 2002. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)
Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive Secret Sharing, or: how to cope with perpetual leakage, Advances in Crytptolgy-Crypto’95. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995)
Nikov, V., Nikova, S.: On proactive secret sharing schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 314–331. Springer, Heidelberg (2004)
Yu, J., Kong, F., Hao, R.: A New Forward Secure Threshold Signature Scheme. In: International Conference on Computational Intelligence and Security 2006, pp. 1243–1246. IEEE Press, New York (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, J., Kong, F. (2007). Forward Secure Threshold Signature Scheme from Bilinear Pairings. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_61
Download citation
DOI: https://doi.org/10.1007/978-3-540-74377-4_61
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74376-7
Online ISBN: 978-3-540-74377-4
eBook Packages: Computer ScienceComputer Science (R0)