Abstract
Secret sharing schemes are multi-party protocols related to key establishment. They also facilitate distributed trust or shared control for critical activities (e.g., signing corporate cheques and opening bank vaults), by gating the critical action on cooperation from t(t ∈ Z +) of n(n ∈ Z +) users. A (t, n) threshold scheme (t < n) is a method by which a trusted party computes secret shares Γ i (1 ⩽ i ⩽ n) from an initial secret Γ 0 and securely distributes Γ i to user. Any t or more users who pool their shares may easily recover Γ 0, but any group knowing only t−1 or fewer shares may not. By the ElGamal public key cryptophytes and the Schnorr’s signature scheme, this paper proposes a new (t, n) threshold signature scheme with (k,m) (k,m ∈ Z +) threshold verification based on the multivariate linear polynomial.
Similar content being viewed by others
References
Desmedt Y, Frankel Y. Threshold cryptosystems [C]//Advances in Cryptology-Crypto-89. New York: Springer-Verlag, 1990: 307–315.
Desmedt Y, Frankel Y. Shared generation of authenticators and signatures [C]// Advances in Cryptology-Crypto-91. New York: Springer-Verlag, 1991: 457–469.
Desmedt Y. Threshold cryptosystems [C]// European Transaction on Telecommunications and Related Technologies-5 (5). Berlin: Springer-Verlag, 1994: 35–43.
Shamir A. A polynomial time algorithm for breaking the basic Merkle-Hellman Cryptosystem [C]// Proceeding of the 23 IEEE Symposium Found on Computer Science. New York: Springer-Verlag, 1982: 142–152.
Thomas W H. Algebra [M]. New York: Springer-Verlag, 1974: 354.
Elgamel T. A PKC and a signature scheme based on discrete logarithm [C]// IEEE Trans Information Theory-31. New York: IEEE, 1985: 469–472.
Schnorr C P. Efficient identification and signature for smart cards [C]//Advance in Cryptology-Crypto-89. Berlin: Springer-Verlag, 1990: 239–251.
Kennetn H, Ray K. Linear algebra [M]. New Jersey: Prentice Hall, Inc. Englewood Cliffs, 1971: 124–125.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: the National Natural Science Foundation of China (No. 10671051), the Natural Science Foundation of Zhejiang Province (No. Y6110782), and the Key Laboratory Foundation of Hangzhou (No. 20100331T11)
Rights and permissions
About this article
Cite this article
Shen, Zh., Yu, Xy. Threshold signature scheme with threshold verification based on multivariate linear polynomial. J. Shanghai Jiaotong Univ. (Sci.) 16, 551–556 (2011). https://doi.org/10.1007/s12204-011-1186-4
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12204-011-1186-4