{"title":"Threshold Signatures in Dynamic Groups","authors":"J. Pomykala, T. Warchol","doi":"10.1109/FGCN.2007.219","DOIUrl":null,"url":null,"abstract":"In this paper we present the efficient solution for the dynamical groups with the variable threshold bound. In fact we consider the more general situation, when there is a family of dynamical groups instead of one group. We were able to handle this more general situation by joining the secret sharing idea together with the certification system device that enabled the system to distinguish the members of distinct groups of the family. The system proposed here is provably secure. The security is proved in the random oracle model, provided the number of corrupted players in the family of groups satisfies the suitable estimates and the \"chosen target CDH problem\" is computationally hard.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"11 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Future Generation Communication and Networking (FGCN 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FGCN.2007.219","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
In this paper we present the efficient solution for the dynamical groups with the variable threshold bound. In fact we consider the more general situation, when there is a family of dynamical groups instead of one group. We were able to handle this more general situation by joining the secret sharing idea together with the certification system device that enabled the system to distinguish the members of distinct groups of the family. The system proposed here is provably secure. The security is proved in the random oracle model, provided the number of corrupted players in the family of groups satisfies the suitable estimates and the "chosen target CDH problem" is computationally hard.