Title :
Threshold Signature Scheme Based on Modular Secret Sharing
Author :
Xie, Qi ; Shen, Zhonghua ; Yu, Xiuyuan
Author_Institution :
Grad. Sch., Zhejiang Univ., Hangzhou, China
Abstract :
How to overcome the conspiracy attacks on threshold signature is very important problem. To resist the conspiracy attacks, many threshold signature schemes are based on the complicated variants of the Lagrange interpolation sharing scheme. Based on Asmuth-Bloom modular secret sharing, a new threshold signature scheme is proposed. The scheme can resist the conspiracy attacks, and is more efficient under pre-computation.
Keywords :
cryptography; digital signatures; Asmuth-Bloom modular secret sharing; Lagrange interpolation sharing scheme; conspiracy attack; threshold signature scheme; Computational intelligence; Computer science; Computer security; Cryptography; Educational institutions; Forgery; Interpolation; Lagrangian functions; Polynomials; Resists; conspiracy attacks; modular secret sharing; threshold signature;
Conference_Titel :
Computational Intelligence and Security, 2008. CIS '08. International Conference on
Conference_Location :
Suzhou
Print_ISBN :
978-0-7695-3508-1
DOI :
10.1109/CIS.2008.78