Efficient generic on-line/off-line (threshold) signatures without key exposure

被引:44
作者
Chen, Xiaofeng [1 ]
Zhang, Fangguo [1 ]
Tian, Haibo [1 ]
Wei, Baodian [1 ]
Susilo, Willy [2 ]
Mu, Yi [2 ]
Lee, Hyunrok [3 ]
Kim, Kwangjo [3 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[3] Informat & Commun Univ, Int Res Ctr Informat Secur IRIS, Taejon 305714, South Korea
基金
中国国家自然科学基金;
关键词
on-line/off-line; threshold signatures; double-trapdoor; chameleon hashing; key exposure problem;
D O I
10.1016/j.ins.2008.06.022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The "hash-sign-switch" paradigm was firstly proposed by Shamir and Tauman with the aim to design an efficient on-line/off-line signature scheme. Nonetheless, all existing on-line/off-line signature schemes based on this paradigm suffer from the key exposure problem of chameleon hashing. To avoid this problem, the signer should pre-compute and store a plenty of different chameleon hash values and the corresponding signatures on the hash values in the off-line phase, and send the collision and the signature for a certain hash value in the on-line phase. Hence, the computation and storage cost for the off-line phase and the communication cost for t0he on-line phase in Shamir-Tauman's signature scheme are still a little more overload. In this paper, we first introduce a special double-trapdoor hash family based on the discrete logarithm assumption and then incorporate it to construct a more efficient generic on-line/off-line signature scheme without key exposure. Furthermore, we also present the first key-exposure-free generic on-line/off-line threshold signature scheme without a trusted dealer. Additionally, we prove that the proposed schemes have achieved the desired security requirements. (C) 2008 Elsevier Inc. All rights reserved.
引用
收藏
页码:4192 / 4203
页数:12
相关论文
共 30 条
[1]  
[Anonymous], 2001, LNCS
[2]  
Ateniese G, 2005, LECT NOTES COMPUT SC, V3352, P165
[3]  
Ateniese G, 2004, LECT NOTES COMPUT SC, V3110, P164
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[5]  
Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
[6]  
Bresson E, 2007, LECT NOTES COMPUT SC, V4450, P217
[7]  
CHAUM D, 1989, LECT NOTES COMPUTER, V435, P212
[8]  
Chen XF, 2004, LECT NOTES COMPUT SC, V3225, P87
[9]  
Chen XF, 2007, LECT NOTES COMPUT SC, V4521, P18
[10]  
Crutchfield C, 2006, LECT NOTES COMPUT SC, V3958, P58