DocumentCode :
2002659
Title :
Threshold Signature Scheme Based on Modular Secret Sharing
Author :
Xie, Qi ; Shen, Zhonghua ; Yu, Xiuyuan
Author_Institution :
Grad. Sch., Zhejiang Univ., Hangzhou, China
Volume :
2
fYear :
2008
fDate :
13-17 Dec. 2008
Firstpage :
442
Lastpage :
445
Abstract :
How to overcome the conspiracy attacks on threshold signature is very important problem. To resist the conspiracy attacks, many threshold signature schemes are based on the complicated variants of the Lagrange interpolation sharing scheme. Based on Asmuth-Bloom modular secret sharing, a new threshold signature scheme is proposed. The scheme can resist the conspiracy attacks, and is more efficient under pre-computation.
Keywords :
cryptography; digital signatures; Asmuth-Bloom modular secret sharing; Lagrange interpolation sharing scheme; conspiracy attack; threshold signature scheme; Computational intelligence; Computer science; Computer security; Cryptography; Educational institutions; Forgery; Interpolation; Lagrangian functions; Polynomials; Resists; conspiracy attacks; modular secret sharing; threshold signature;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security, 2008. CIS '08. International Conference on
Conference_Location :
Suzhou
Print_ISBN :
978-0-7695-3508-1
Type :
conf
DOI :
10.1109/CIS.2008.78
Filename :
4724815
Link To Document :
بازگشت