Skip to main content

A Proactive Secret Sharing for Server Assisted Threshold Signatures

  • Conference paper
High Performance Computing and Communications (HPCC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4208))

Abstract

Threshold signature schemes distribute secret information to several servers and make the whole system that maintains the secret information fault-tolerant. Since threshold signature schemes typically assume that the shared signing function can only be activated by a quorum number of servers. If anyone has a power to activate the signing function of servers, he can easily compute valid signatures for a specific organization without knowing the private key. S. Xu et al. proposed a general construction to build threshold signature schemes (called as server assisted threshold signatures) which provide an organization (e.g., a user) with controllability for activating his private signing function in a certain enhanced way. In this paper, we newly propose proactive secret sharing schemes which are suitable for server-assisted threshold signatures.

This work was partially supported by Grant No. R01-2006-000-10260-0 from the Basic Research Program of KOSEF, and Strategic International Cooperative Program, Japan Science and Technology Agency (JST).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bouncy Castle 1.24, https://www.bouncycastle.org

  2. Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, A.R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: Proc. of 9th ACM CCS (2002)

    Google Scholar 

  3. Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks, UCLA Computer Science Technical Report 200030 (October 2000)

    Google Scholar 

  4. Garms, J., Somerfield, D.: Professional Java Security, Wrox Press Ltd. (2001)

    Google Scholar 

  5. Zhou, L.: Towards Fault-Tolerant and Secure On-line Services, PhD Dissertation, Department of Computer Science, Cornell University, Ithaca, NY USA (April 2001)

    Google Scholar 

  6. Feldman, P.: A Pracitcal Scheme for Non-Interactive Verifiable Secret Sharing. In: Proc. of 28th FOCS (1987)

    Google Scholar 

  7. MacKenzie, P., Reiter, M.: Networked Cryptographic Devices Resilient to Capture. In: IEEE Security and Privacy 2001, May 14-16 (2001)

    Google Scholar 

  8. MacKenzie, P., Reiter, M.: Two-Party Generation of DSA Signatures. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 137–154. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Gennaro, R., Jarecki, S., Krawczyk, H.: Revisiting the Distributed Key Generation for Discrete-Log Based Cryptosystems. In: RSA Security 2003 (2003)

    Google Scholar 

  10. Jarecki, S.: Proactive Secret Sharing and Public Key Cryptosystems. MIT Master of Engineering Thesis (1995)

    Google Scholar 

  11. Xu, S., Sandhu, R.: Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 355–372. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Rabin, T.: A Simplified Approach to Threshold and Proactive RSA. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 89–104. Springer, Heidelberg (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, JP., Rhee, K.H., Sakurai, K. (2006). A Proactive Secret Sharing for Server Assisted Threshold Signatures. In: Gerndt, M., Kranzlmüller, D. (eds) High Performance Computing and Communications. HPCC 2006. Lecture Notes in Computer Science, vol 4208. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11847366_26

Download citation

  • DOI: https://doi.org/10.1007/11847366_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-39368-9

  • Online ISBN: 978-3-540-39372-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics