Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates
In a (t, n) threshold digital signature scheme, t out of n signers must co-operate to issue a signature. We present an efficient and robust (t, n) threshold version of Schnorr’s signature scheme. We prove it to be as secure as Schnorr’s signature scheme, i.e., existentially unforgeable under adaptively chosen message attacks. The signature scheme is then incorporated into a (t,n) threshold scheme for implicit certificates. We prove the implicit certificate scheme to be as secure as the distributed Schnorr signature scheme.
KeywordsSignature Scheme Threshold Scheme Discrete Logarithm Problem Random Oracle Model Random Tape
Unable to display preview. Download preview PDF.
- M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In First Annual ACM Conference on Computer and Communications Security, pages 62–73, 1993.Google Scholar
- D. Brown. Implicitly certifying signatures securely. manuscript.Google Scholar
- R. Gallant D. Brown and S. Vanstone. Provably secure implicit certificate schemes. In Financial Cryptography’ 01, to appear.Google Scholar
- P. Feldman. A practical scheme for non-interactive verifiable secret sharing. In 28th FOCS, pages 427–437, 1987.Google Scholar
- R. Gennaro S. Jarecki H. Krawczyk and T. Rabin. Secure distributed key generation for discrete-log based cryptosystems. In Eurocrypt’ 99, pages 295–310, 1999.Google Scholar
- S. K. Langford. Threshold DSS signatures without a trusted party. In Crypto’ 95, pages 397–409, 1995.Google Scholar
- E. Okamoto, G. Davida, and M. Mambo. Some recent research aspects of threshold cryptography. In Workshop on Information Security Applications, 1997.Google Scholar
- C. Park and K. Kurosawa. New elgamal type threshold digital signature scheme. IEICE Trans., E79-A:86–93, 1996.Google Scholar
- T.P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Crypto’ 91, pages 129–140, 1991.Google Scholar
- T.P. Pedersen. A threshold cryptosystem without a trusted party. In Eurocrypt’ 91, pages 522–526, 1991.Google Scholar
- L. Pintsov and S. Vanstone. Postal revenue collection in the digital age. In Financial Cryptography’ 00, 2000.Google Scholar
- D. Pointcheval and J. Stern. Security proofs for signature schemes. In Eurocrypt’ 96, pages 387–399, 1996.Google Scholar