Skip to main content
Log in

Threshold signature scheme with threshold verification based on multivariate linear polynomial

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

Secret sharing schemes are multi-party protocols related to key establishment. They also facilitate distributed trust or shared control for critical activities (e.g., signing corporate cheques and opening bank vaults), by gating the critical action on cooperation from t(tZ +) of n(nZ +) users. A (t, n) threshold scheme (t < n) is a method by which a trusted party computes secret shares Γ i (1 ⩽ in) from an initial secret Γ 0 and securely distributes Γ i to user. Any t or more users who pool their shares may easily recover Γ 0, but any group knowing only t−1 or fewer shares may not. By the ElGamal public key cryptophytes and the Schnorr’s signature scheme, this paper proposes a new (t, n) threshold signature scheme with (k,m) (k,mZ +) threshold verification based on the multivariate linear polynomial.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Desmedt Y, Frankel Y. Threshold cryptosystems [C]//Advances in Cryptology-Crypto-89. New York: Springer-Verlag, 1990: 307–315.

    Chapter  Google Scholar 

  2. Desmedt Y, Frankel Y. Shared generation of authenticators and signatures [C]// Advances in Cryptology-Crypto-91. New York: Springer-Verlag, 1991: 457–469.

    Google Scholar 

  3. Desmedt Y. Threshold cryptosystems [C]// European Transaction on Telecommunications and Related Technologies-5 (5). Berlin: Springer-Verlag, 1994: 35–43.

    Google Scholar 

  4. Shamir A. A polynomial time algorithm for breaking the basic Merkle-Hellman Cryptosystem [C]// Proceeding of the 23 IEEE Symposium Found on Computer Science. New York: Springer-Verlag, 1982: 142–152.

    Google Scholar 

  5. Thomas W H. Algebra [M]. New York: Springer-Verlag, 1974: 354.

    Google Scholar 

  6. Elgamel T. A PKC and a signature scheme based on discrete logarithm [C]// IEEE Trans Information Theory-31. New York: IEEE, 1985: 469–472.

    Google Scholar 

  7. Schnorr C P. Efficient identification and signature for smart cards [C]//Advance in Cryptology-Crypto-89. Berlin: Springer-Verlag, 1990: 239–251.

    Chapter  Google Scholar 

  8. Kennetn H, Ray K. Linear algebra [M]. New Jersey: Prentice Hall, Inc. Englewood Cliffs, 1971: 124–125.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhong-hua Shen  (沈忠华).

Additional information

Foundation item: the National Natural Science Foundation of China (No. 10671051), the Natural Science Foundation of Zhejiang Province (No. Y6110782), and the Key Laboratory Foundation of Hangzhou (No. 20100331T11)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shen, Zh., Yu, Xy. Threshold signature scheme with threshold verification based on multivariate linear polynomial. J. Shanghai Jiaotong Univ. (Sci.) 16, 551–556 (2011). https://doi.org/10.1007/s12204-011-1186-4

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-011-1186-4

Key words

CLC number

Navigation