Abstract
The traditional cryptosystem is based on the security of private key. While the private key is leaked, the signature information may be exposed. Based on this, a threshold signature scheme with strong forward security based on Chinese remainder theorem is proposed. The signature is generated through the cooperation of members, which solve the problem of authoritative fraud introduced by the dealer. The private key is updated periodically to handle the threat caused by the private key leakage. Security analysis shows that the existing signatures will not be affected by the compromise of the corresponding private keys, and do not allow for forgery of the future signatures, which shows that the new scheme has the forward security and the backward security. The efficiency analysis shows that our scheme is more efficient compared with the well-known existing schemes in the literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anderson, R.: Invited lecture. In: Proceedings of Fourth Annual Conference on Computer and Communication Security, pp. 1–7. ACM Press, New York (1997)
Bellare, M., Miner, S.K.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431–448. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_28
Anderson, R.: Two remarks on public key cryptology. In: Proceedings of the 4th ACM Conference on Computer and Communication California, pp. 16–30. Springer, USA (1997)
Burmester, M., Chrissikopoulos, V., Kotzanikolaou, P., Magkos, E.: Strong forward security. In: Dupuy, M., Paradinas, P. (eds.) SEC 2001. IIFIP, vol. 65, pp. 109–121. Springer, Boston, MA (2002). https://doi.org/10.1007/0-306-46998-7_8
Wang, M.W., Hu, Y.X.: A forward-backward security digital signature scheme. J. Xidian Univ. 41(2), 71–78 (2014)
Li, C., He, M.X.: A forward and backward security digital signature scheme. In: China Cryptography Society Annual Conference (2008)
Wang, Y.B.: Two-way secure signature scheme based on discrete logarithm. J. Qinghai Normal Univ. (Nat. Sci. Ed.) 2, 6–10 (2016)
Yang, J., Qian, H.F., Li, Z.B.: A proxy signature scheme with strong forward security. Comput. Eng. 34(17), 162–166 (2008)
Ye, J., Ding, Y., Liu, Y.N.: Forward and backward secure group signature scheme based on verifiable random number. J. Lanzhou Univ. Technol. 37(1), 86–90 (2011)
Xu, G.B., Jiang, D.H., Liang, Q.X.: A strong forward secure digital signature scheme. Comput. Eng. 39(9), 167–169 (2013)
Yang, X.D.: Research on improved verifiable strong forward security ring signature scheme. Comput. Appl. Softw. 30(4), 319–322 (2013)
Wang, Y., Hou, Q.F., Zhang, X.Q., Huang, M.J.: Dynamic threshold signature scheme based on Chinese remainder theorem. J. Comput. Appl. 38(4), 1041–1045 (2018)
Shi, R.H., Zhou, Y.: A forward-safe dynamic subgroup signature scheme. Comput. Eng. Appl. 42(30), 130–133 (2006)
Tang, L.W., Du, W.Z.: Forward secure group blind signature scheme based on Chinese remainder theorem. J. Comput. Appl. 32(s1), 53–55 (2012)
Ou, H.W., Zhang, S.W.: Forward security group signature based on Chinese remainder theorem. J. Comput. Appl. 31(s1), 98–100 (2011)
Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)
Hou, Z.F., Tan, M.N.: A CRT-basted (tn) threshold signature scheme without a dealer. J. Electron. Inf. Technol. 11(3), 975–986 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Cheng, Yg., Jia, Zj., Gong, B., Wang, Lp., Lei, Yf. (2019). Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-21373-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21372-5
Online ISBN: 978-3-030-21373-2
eBook Packages: Computer ScienceComputer Science (R0)