Advertisement

A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers

  • Ming-wen Wang
  • Qing-xin Zhu
  • Li Qing
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3759)

Abstract

In this paper we present a novel robust coalition-resistant (t, n) threshold signature scheme with anonymous signers. Only t or more group members can generate signatures on behalf of a group with n members, while any t-1 or fewer members cannot do the same thing. We construct the scheme based on a modified RSA digital signature scheme and Shamir’s secret sharing scheme. The signature process consists of four phases: system setup, individual signature generation and verification, sign and verify. The designated signature combiner can verify the partial signature from the auxiliary value of the partial signature, and the scheme can resist the coalition attack from more than t malicious group members due to the use of shadow partial signature. Compared with the existing threshold signature schemes, the scheme is robust and secure, and convenient to implement.

Keywords

threshold scheme group scheme digital signature coalition attack robust scheme 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Desmedt, Y.G.: Society and group oriented cryptography: A new concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120–127. Springer, Heidelberg (1988)Google Scholar
  2. 2.
    Desmedt, Y.G., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457–469. Springer, Heidelberg (1992)Google Scholar
  3. 3.
    Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust and efficient sharing of RSA functions. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 157–172. Springer, Heidelberg (1996)Google Scholar
  4. 4.
    Harn, L.: Group-oriented (t, n) threshold digital signature scheme and multisignature. IEE proceedings– Computers and Digital Techniques 141(5), 307–313 (1994)zbMATHCrossRefGoogle Scholar
  5. 5.
    Li, C.-M., Hwang, T., Lee, N.-Y.: Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 194–204. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  6. 6.
    Li, Z.-C., Zhang, J.-M., Luo, J., Song, W., Dai, Y.-Q.: Group-oriented (t, n) threshold digital signature schemes with traceable signers. In: Kou, W., Yesha, Y., Tan, C.J.K. (eds.) ISEC 2001. LNCS, vol. 2040, pp. 57–69. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207–220. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  9. 9.
    Tseng, Y., Jan, J.: Attacks on threshold signature schemes with traceable signers. Information Processing Letters 71, 1–4 (1999)zbMATHCrossRefMathSciNetGoogle Scholar
  10. 10.
    Wang, G., Han, X., Zhu, B.: On the security of two threshold signature schemes with traceable signers. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 111–122. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Wang, C.T., Lin, C.H., Chang, C.C.: Threshold signature schemes with traceable signers in group communications. Computer Communications 21(8), 771–776 (1998)CrossRefGoogle Scholar
  12. 12.
    Wang, G.L., Qing, S.H.: Weaknesses of some threshold group signature schemes. Journal of Software 11(10), 1326–1332 (2000)Google Scholar
  13. 13.
    Xu, Q.L.: A modified threshold RSA digital signature scheme. Chinese Journal of Computers 23(5), 449–453 (2000)MathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Ming-wen Wang
    • 1
  • Qing-xin Zhu
    • 1
  • Li Qing
    • 1
  1. 1.School of Computer Science and EngineeringUEST of ChinaChengduChina

Personalised recommendations