z-logo
Premium
How to construct efficient on‐line/off‐line threshold signature schemes through the simulation approach
Author(s) -
Gao Chongzhi,
Wei Baodian,
Xie Dongqing,
Tang Chunming
Publication year - 2009
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.1438
Subject(s) - signature (topology) , cryptosystem , schnorr signature , computer science , line (geometry) , scheme (mathematics) , elgamal signature scheme , theoretical computer science , construct (python library) , security analysis , simple (philosophy) , reduction (mathematics) , algorithm , mathematics , cryptography , blind signature , public key cryptography , computer security , encryption , computer network , mathematical analysis , philosophy , epistemology , geometry
An on‐line/off‐line threshold signature () scheme is a distributed cryptosystem in which a group of players jointly generate a signature for a message and use the on‐line/off‐line technique to improve the efficiency of signing. An scheme can be applied to large‐scaled distributed data storage systems and can highly improve the efficiency of writing files. There are two approaches to construct an ordinary threshold signature scheme: the direct approach and the simulation approach. Owing to its simplicity, people tend to use the simulation approach, in which the security of a threshold signature scheme is reduced to the security of its underlying (and simpler) signature scheme. The security proof in this approach is based on a theorem that guarantees the validity of the security reduction—we call this theorem the simulation theorem. However, the simulation theorem (and thus the simulation approach) for an ordinary threshold signature scheme cannot be applied to the on‐line/off‐line cases, because partial signature exposure problems might occur in these cases. This paper presents a simulation theorem for the on‐line/off‐line cases, where the security of an scheme is reduced to the security of a so‐called divisible on‐line/off‐line signature scheme. This provides a theoretical basis for constructing an scheme through the simulation approach. Furthermore, through this approach, we present a concrete scheme, which is efficient and its security proof is simple. Copyright © 2009 John Wiley & Sons, Ltd.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here