Skip to main content

Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem

  • Conference paper
  • First Online:
Security and Privacy in New Computing Environments (SPNCE 2019)

Abstract

The traditional cryptosystem is based on the security of private key. While the private key is leaked, the signature information may be exposed. Based on this, a threshold signature scheme with strong forward security based on Chinese remainder theorem is proposed. The signature is generated through the cooperation of members, which solve the problem of authoritative fraud introduced by the dealer. The private key is updated periodically to handle the threat caused by the private key leakage. Security analysis shows that the existing signatures will not be affected by the compromise of the corresponding private keys, and do not allow for forgery of the future signatures, which shows that the new scheme has the forward security and the backward security. The efficiency analysis shows that our scheme is more efficient compared with the well-known existing schemes in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anderson, R.: Invited lecture. In: Proceedings of Fourth Annual Conference on Computer and Communication Security, pp. 1–7. ACM Press, New York (1997)

    Google Scholar 

  2. Bellare, M., Miner, S.K.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431–448. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_28

    Chapter  Google Scholar 

  3. Anderson, R.: Two remarks on public key cryptology. In: Proceedings of the 4th ACM Conference on Computer and Communication California, pp. 16–30. Springer, USA (1997)

    Google Scholar 

  4. Burmester, M., Chrissikopoulos, V., Kotzanikolaou, P., Magkos, E.: Strong forward security. In: Dupuy, M., Paradinas, P. (eds.) SEC 2001. IIFIP, vol. 65, pp. 109–121. Springer, Boston, MA (2002). https://doi.org/10.1007/0-306-46998-7_8

    Chapter  Google Scholar 

  5. Wang, M.W., Hu, Y.X.: A forward-backward security digital signature scheme. J. Xidian Univ. 41(2), 71–78 (2014)

    Google Scholar 

  6. Li, C., He, M.X.: A forward and backward security digital signature scheme. In: China Cryptography Society Annual Conference (2008)

    Google Scholar 

  7. Wang, Y.B.: Two-way secure signature scheme based on discrete logarithm. J. Qinghai Normal Univ. (Nat. Sci. Ed.) 2, 6–10 (2016)

    Google Scholar 

  8. Yang, J., Qian, H.F., Li, Z.B.: A proxy signature scheme with strong forward security. Comput. Eng. 34(17), 162–166 (2008)

    Google Scholar 

  9. Ye, J., Ding, Y., Liu, Y.N.: Forward and backward secure group signature scheme based on verifiable random number. J. Lanzhou Univ. Technol. 37(1), 86–90 (2011)

    MATH  Google Scholar 

  10. Xu, G.B., Jiang, D.H., Liang, Q.X.: A strong forward secure digital signature scheme. Comput. Eng. 39(9), 167–169 (2013)

    Google Scholar 

  11. Yang, X.D.: Research on improved verifiable strong forward security ring signature scheme. Comput. Appl. Softw. 30(4), 319–322 (2013)

    Google Scholar 

  12. Wang, Y., Hou, Q.F., Zhang, X.Q., Huang, M.J.: Dynamic threshold signature scheme based on Chinese remainder theorem. J. Comput. Appl. 38(4), 1041–1045 (2018)

    Google Scholar 

  13. Shi, R.H., Zhou, Y.: A forward-safe dynamic subgroup signature scheme. Comput. Eng. Appl. 42(30), 130–133 (2006)

    Google Scholar 

  14. Tang, L.W., Du, W.Z.: Forward secure group blind signature scheme based on Chinese remainder theorem. J. Comput. Appl. 32(s1), 53–55 (2012)

    Google Scholar 

  15. Ou, H.W., Zhang, S.W.: Forward security group signature based on Chinese remainder theorem. J. Comput. Appl. 31(s1), 98–100 (2011)

    Google Scholar 

  16. Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)

    Article  MathSciNet  Google Scholar 

  17. Hou, Z.F., Tan, M.N.: A CRT-basted (tn) threshold signature scheme without a dealer. J. Electron. Inf. Technol. 11(3), 975–986 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi-juan Jia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cheng, Yg., Jia, Zj., Gong, B., Wang, Lp., Lei, Yf. (2019). Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21373-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21372-5

  • Online ISBN: 978-3-030-21373-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics