Skip to main content
Log in

Universally composable proactive threshold RSA signature

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

Recently some efforts were made towards capturing the security requirements within the composable security framework. This modeling has some significant advantages in designing and analyzing complex systems. The threshold signature was discussed and a definition was given based on the universal composability framework, which is proved to be equivalent to the standard security definition. Furthermore, a simple, efficient and proactive threshold RSA signature protocol was presented. It is proved to be correct, consistent and unforgeable relative to the environment that at most t − 1 parties are corrupted in each proactive stage. It is also secure under the universal composability framework. It is a UC based security and is proved to be equivalent to the standard security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shoup V. Practical threshold signatures [C]// EUROCRYPT 2000. LNCS, Berlin: Springer-Verlag, 2000: 207–220.

    Chapter  Google Scholar 

  2. Ostrovsky R, Yung M. How to withstand mobile virus attack [C]//Proceeding of the 10th ACM Symposium on Principles of Distributed Computing. [s.l.]: ACM, 1991: 51–59.

  3. Frankel Y, Gemmell P, MacKenzie P D, et al. Practive RSA [C]//CRYPTO 97. Berlin: Springer-Verlag, 1997, 440–454.

    Google Scholar 

  4. Frankel Y, MacKenzie P D, Yung M. Adaptive security for the additive-sharing based proactive RSA [C]//PKC’ 01. LNCS, Berlin: Springer-Verlag, 2001: 240–263.

    Google Scholar 

  5. Almansa J, Damgard I, Nielsen J. Simplified threshold RSA with adaptive and proactive security [C]//EUROCRYPT 2006, LNCS. Berlin: Springer-Verlag, 2006: 593–611.

    Chapter  Google Scholar 

  6. Canetti R. Universally composable security: A new paradigm for cryptographic protocols [C]//Proceedings of the 42th IEEE Symposium on Foundations of Computer Science, New York: IEEE Computer Society Press, 2001: 136–145.

    Google Scholar 

  7. Canetti R, Rabin T. Universal Composition with Joint State [C]//Crypto 2003, LNCS. Berlin: Springer-Verlag, 2003: 265–281.

    Google Scholar 

  8. Canetti R, Gennaro R, Jarecki S, et al. Adaptive security for threshold cryptosystems [C]// CRYPTO 1999, LNCS. Berlin: Springer-Verlag, 1999: 98–115.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuan Hong  (洪 璇).

Additional information

Foundation item: the National Natural Science Foundation of China (Nos. 60573030, 90704004); the National Basic Research Program (973) of China (No. 2007CB311201)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hong, X., Chen, Kf. & Long, Y. Universally composable proactive threshold RSA signature. J. Shanghai Jiaotong Univ. (Sci.) 13, 659–663 (2008). https://doi.org/10.1007/s12204-008-0659-6

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-008-0659-6

Key words

CLC number

Navigation