How to construct efficient on-line/off-line threshold signature schemes through the simulation approach

被引:1
|
作者
Gao, Chong-zhi [1 ]
Wei, Baodian [2 ]
Xie, Dongqing [1 ]
Tang, Chunming [3 ]
机构
[1] Guangzhou Univ, Guangzhou Higher Educ Mega Ctr, Coll Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Dept Elect & Commun Engn, Guangzhou 510275, Guangdong, Peoples R China
[3] Guangzhou Univ, Inst Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
来源
关键词
signature schemes; threshold signature schemes; on-line/off-line; ROBUST; RSA;
D O I
10.1002/cpe.1438
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An on-line/off-line threshold signature (OTS) scheme is a distributed cryptosystem in which a group of players jointly generate a signature for a message and use the on-line/off-line technique to improve the efficiency of signing. An OTS scheme can be applied to large-scaled distributed data storage systems and can highly improve the efficiency of writing files. There are two approaches to construct an ordinary threshold signature scheme: the direct approach and the simulation approach. Owing to its simplicity, people tend to use the simulation approach, in which the security of a threshold signature scheme is reduced to the security of its underlying (and simpler) signature scheme. The security proof in this approach is based on a theorem that guarantees the validity of the security reduction-we call this theorem the simulation theorem. However, the simulation theorem (and thus the simulation approach) for an ordinary threshold signature scheme cannot be applied to the on-line/off-line cases, because partial signature exposure problems might occur in these cases. This paper presents a simulation theorem for the on-line/off-line cases, where the security of an OTS scheme is reduced to the security of a so-called divisible on-line/off-line signature scheme. This provides a theoretical basis for constructing an OTS scheme through the simulation approach. Furthermore, through this approach, we present a concrete OTS scheme, which is efficient and its security proof is simple. Copyright (c) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:1351 / 1372
页数:22
相关论文
共 50 条
  • [41] The significance of off-line learning for on-line projects
    Scott, DJ
    ROADBLOCKS ON THE INFORMATION HIGHWAY: THE IT REVOLUTION IN JAPANESE EDUCATION, 2003, : 249 - 264
  • [42] Generic On-line/Off-line Aggregate Signatures
    Wu, Chunhui
    Xing, Yuqing
    Chen, Xiaofeng
    Long, Dongyang
    Lee, Hyunrok
    Kim, Kwangjo
    2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 107 - +
  • [43] ON-LINE/OFF-LINE DIGITAL-SIGNATURES
    EVEN, S
    GOLDREICH, O
    MICALI, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 263 - 275
  • [44] Pressure Evaluation in On-Line and Off-Line Signatures
    Dimitrova, Desislava
    Gluhchev, Georgi
    BIOMETRIC ID MANAGEMENT AND MULTIMODAL COMMUNICATION, PROCEEDINGS, 2009, 5707 : 207 - 211
  • [45] From Off-Line to Continuous On-line Maintenance
    Pezze, Mauro
    2012 28TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE (ICSM), 2012, : 2 - 3
  • [46] Investigations of on-line/off-line tests for sensors
    Fischell, M
    Anheier, W
    ICECS 2001: 8TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS I-III, CONFERENCE PROCEEDINGS, 2001, : 117 - 120
  • [47] Image compression with on-line and off-line learning
    Simard, PY
    Burges, CJC
    Steinkraus, D
    Malvar, HS
    2003 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL 2, PROCEEDINGS, 2003, : 259 - 262
  • [48] On-line, off-line - Which is best for you?
    Mauger, B
    CONTROL AND INSTRUMENTATION, 1996, 28 (03): : 37 - 39
  • [49] ON-LINE AND OFF-LINE STRATEGIES FOR PREVENTING DEPRESSION
    Smit, F.
    Cuijpers, P.
    EUROPEAN PSYCHIATRY, 2009, 24
  • [50] On-line support of off-line exercises in mathematics
    Nishizawa, H
    Saito, T
    Pohjolainen, S
    ADVANCED RESEARCH IN COMPUTERS AND COMMUNICATIONS IN EDUCATION, VOL 2: NEW HUMAN ABILITIES FOR THE NETWORKED SOCIETY, 1999, 55 : 343 - 346