Threshold signature scheme with subliminal channel

Xuanwu Zhou, Ping Wei
{"title":"Threshold signature scheme with subliminal channel","authors":"Xuanwu Zhou, Ping Wei","doi":"10.1109/CCDC.2009.5192262","DOIUrl":null,"url":null,"abstract":"Threshold signature is an important signature with additional property; it can achieve effective supervision on signature generating and signature verifying. This paper analyzed the basic principles of threshold cryptosystem and its superiority for application in threshold signature schemes. Considering the security threats and system flaws of present signature schemes, we present a threshold signature scheme based on elliptic curves cryptosystem. The scheme achieves threshold generating and verifying of signature by utilizing secret sharing in signature processing, and it also achieves threshold management of identity tracing by identity blinding and probabilistic encryption algorithms. As security proof for the scheme, we present a typical subliminal channel scheme for the threshold signature. The subliminal message can only be generated and recovered by no less than t valid members; so the subliminal channel renders effective supervision on subliminal message and identity secrecy. Further analyses and comparison also justify the brevity, security and high efficiency of the scheme.","PeriodicalId":127110,"journal":{"name":"2009 Chinese Control and Decision Conference","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2009-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Chinese Control and Decision Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCDC.2009.5192262","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Threshold signature is an important signature with additional property; it can achieve effective supervision on signature generating and signature verifying. This paper analyzed the basic principles of threshold cryptosystem and its superiority for application in threshold signature schemes. Considering the security threats and system flaws of present signature schemes, we present a threshold signature scheme based on elliptic curves cryptosystem. The scheme achieves threshold generating and verifying of signature by utilizing secret sharing in signature processing, and it also achieves threshold management of identity tracing by identity blinding and probabilistic encryption algorithms. As security proof for the scheme, we present a typical subliminal channel scheme for the threshold signature. The subliminal message can only be generated and recovered by no less than t valid members; so the subliminal channel renders effective supervision on subliminal message and identity secrecy. Further analyses and comparison also justify the brevity, security and high efficiency of the scheme.
具有阈值通道的阈值签名方案
阈值签名是一种具有附加性质的重要签名;它可以实现对签名生成和签名验证的有效监督。分析了阈值密码体制的基本原理及其在阈值签名方案中的应用优势。针对现有签名方案存在的安全威胁和系统缺陷,提出了一种基于椭圆曲线密码体制的阈值签名方案。该方案利用签名处理中的秘密共享实现了签名的阈值生成和验证,并通过身份盲和概率加密算法实现了身份跟踪的阈值管理。作为该方案的安全性证明,我们提出了一个典型的阈值签名的阈下信道方案。潜意识信息只能由不少于1个有效成员生成和恢复;因此,潜意识通道对潜意识信息和身份保密进行了有效的监督。进一步的分析和比较也证明了该方案简洁、安全、高效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信