Skip to main content

Undetachable Threshold Signatures

  • Conference paper
  • First Online:
Cryptography and Coding (Cryptography and Coding 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2260))

Included in the following conference series:

Abstract

A major problem of mobile agents is their inability to authenticate transactions in a hostile environment. Users will not wish to equip agents with their private signature keys when the agents may execute on untrusted platforms. Undetachable signatures were introduced to solve this problem by allowing users to equip agents with the means to sign signatures for tightly constrainedtransactions, using information especially derived from the user private signature key. However, the problem remains that a platform can force an agent to commit to a sub-optimal transaction. In parallel with the work on undetachable signatures, much work has been performedon thresholdsignature schemes, which allow signing power to be distributed across multiple agents, thereby reducing the trust in a single entity. We combine these notions and introduce the concept of an undetachable threshold signature scheme, which enables constrainedsigning power to be distributed across multiple agents, thus reducing the necessary trust in single agent platforms. We also provide an RSA-based example of such a scheme basedon a combination of Shoup’s thresholdsignature scheme, [1] and Kotzanikolaou et al’s undetachable signature scheme, [2].

The work reportedin this paper has formed part of the Software Based Systems area of the Core 2 Research Programme of the Virtual Centre of Excellence in Mobile & Personal Communications, Mobile VCE, www.mobilevce.com, whose funding support, including that of the EPSRC, is gratefully acknowledged. More detailed technical reports on this research are available to Industrial Members of Mobile VCE.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shoup, V.: Practical threshold signatures. In Preneel, B., ed.: Advances in Cryptology —EUROCRYPT 2000. Number 1807 in LNCS, Springer-Verlag, Berlin (2000) 207–220

    Chapter  Google Scholar 

  2. Kotzanikolaou, P., Burmester, M., Chrissikopoulos, V.: Secure transactions with mobile agents in hostile environments. In Dawson, E., Clark, A., Boyd, C., eds.: Information Security and Privacy, Proceedings of the 5th Australasian Conference ACISP 2000. Number 1841 in LNCS, Springer-Verlag (2000) 289–297

    Chapter  Google Scholar 

  3. Sander, T., Tschudin, C.: Protecting mobile agents against malicious hosts. In Vigna, G., ed.: Mobile Agents and Security. Number 1419 in LNCS, Springer-Verlag, Berlin (1998) 44–60

    Chapter  Google Scholar 

  4. Shamir, A.: How to share a secret. Communications of the ACM 22 (1979) 612–613

    Article  MATH  MathSciNet  Google Scholar 

  5. Desmedt, Y.: Society andgroup oriented cryptography. In Pomerance, C., ed.: Advances in Cryptology — Crypto’ 87. Number 293 in LNCS, Springer-Verlag, Berlin (1988) 120–127

    Google Scholar 

  6. Damgård, I., Koprowski, M.: Practical threshold RSA signatures without a trusted dealer. In Pfitzmann, B., ed.: Advances in Cryptology — EUROCRYPT 2001. Number 2045 in LNCS, Springer-Verlag, Berlin (2001) 152–165

    Chapter  Google Scholar 

  7. Langford, S.K.: Threshold DSS signatures without a trusted party. In Coppersmith, D., ed.: Advances in Cryptology — Crypto’ 95. Number 963 in LNCS, Springer-Verlag, Berlin (1995) 397–409

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Borselius, N., Mitchell, C.J., Wilson, A. (2001). Undetachable Threshold Signatures. In: Honary, B. (eds) Cryptography and Coding. Cryptography and Coding 2001. Lecture Notes in Computer Science, vol 2260. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45325-3_21

Download citation

  • DOI: https://doi.org/10.1007/3-540-45325-3_21

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43026-1

  • Online ISBN: 978-3-540-45325-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics