Abstract
In this paper, we are going to combine the idea of the (t, n) threshold signature scheme with the multisignature scheme and propose a new type of signature scheme, called the (t, n) threshold-multisignature scheme. In the (t, n) threshold-multisignature scheme, at least t shareholders of a specific group have to cooperate to generate a valid group signature and suspected forgery implies traceability of adversarial shareholders. The validity of that signature for the specific group can be verified without knowing the membership of the signers to that group.
Chapter PDF
References
Y. Desmedt and Y. Frankel: ”Shared Generation of Authenticators and Signatures”, Advances in Cryptology — Crypto '91, Proceedings, pp.457–469, Springer Verlag, 1991.
L. Harn: ”(t,n) Threshold Signature and Digital Multisignature”, Workshop on Cryptography & Data Security, Proceedings, pp.61–73, June 7–9, Chung Cheng Institute of Technology, R.O.C., 1993.
A. Shamir: ”How to Share A Secret”, Commun. ACM, 22:612–613, 1979.
C. Li, T. Hwang and N. Lee: ”Remark on the Threshold RSA Signature Scheme”, Advances in Cryptology — Crypto '93, Proceedings, 1993.
K. Itakura and K. Nakamura: ”A Public-Key Cryptosystem Suitable for Digital Multisignatures”, NEC Research and Develop., 71, pp.1–8, 1983.
”The Digital Signature Standard”, Commun. ACM, 35, No.7, pp.36–40, 1992.
S. M. Yen and C. S. Laih: ”New Digital Signature Scheme Based on Discrete Logarithm”, Electrionics Letters, Vol. 29, (12), pp.1120–1121, 1993.
T. Hardjono and Y. Zheng: ”A Practical Digital Multisignature Scheme Based on Discrete Logarithms”, Advances in Cryptology — AUSCRYPTO'92, pp. 16–21, 1992.
L. Harn and T. Kiesler: ”New Scheme for Digital Multisignatures”, Electronic Letters, Vol. 25, No. 15, pp. 1002–1003, 1989.
K. Ohta and T. Okamoto: ”A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme”, Advances in Cryptoloy — ASIACRYPT'91, pp. 75–79, 1991.
T. Okamoto: ”A Digital Multisignature Scheme Using Bijective Public-Key Cryptosystem”, ACM Transactions on Computer Systems, Vol. 6, No. 8, pp. 432–441, 1988.
Y. Zheng, T. Matsumoto and H. Imai: ”Structural Properties of One — Way Hash Functions”, Advances in Cryptology — Crypto '90, Proceedings, pp. 285–302, Springer Verlag, 1990.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, CM., Hwang, T., Lee, NY. (1995). Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. In: De Santis, A. (eds) Advances in Cryptology — EUROCRYPT'94. EUROCRYPT 1994. Lecture Notes in Computer Science, vol 950. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053435
Download citation
DOI: https://doi.org/10.1007/BFb0053435
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60176-0
Online ISBN: 978-3-540-44717-7
eBook Packages: Springer Book Archive