Skip to main content

Democratic Systems

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2119))

Included in the following conference series:

Abstract

Digital signature is a breakthrough of modern cryptographic systems. A (t, n) threshold digital signature allows every set of cardinality t or more (out-of n) co-signers to authenticate a message. In almost all existing threshold digital signatures the threshold parameter t is fixed. There are applications, however, in which the threshold parameter needs to be changed from time to time. This paper considers such a scenario, in order to discuss relevant problems, and proposes a model that solves the related problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Benaloh, “Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret,” in Advances in Cryptology-Proceedings of CRYPTO’ 86 (A. Odlyzko, ed.), vol. 263 of Lecture Notes in Computer Science, pp. 251–260, Springer-Verlag, 1987.

    Google Scholar 

  2. M. Ben-Or, S. Goldwasser, and A. Wigderson, “Completeness Theorem for Non-Cryptographic Fault-Tolerant Distributed Computation,” in 20th Annual Symposium on the Theory of Computing (STOC), pp. 1–10, 1988.

    Google Scholar 

  3. G. Blakley, “Safeguarding cryptographic keys,” in Proceedings of AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317, 1979.

    Google Scholar 

  4. C. Boyd, “Digital Multisignatures,” in Cryptography and Coding (H. Beker and F. Piper, eds.), pp. 241–246, Clarendon Press, 1989.

    Google Scholar 

  5. D. Denning, “Digital Signatures with RSA and Other Public-Key Cryptosystems,” Communications of the ACM, vol. 27, no. 4, pp. 388–392, 1984.

    Article  MathSciNet  Google Scholar 

  6. Y. Desmedt and Y. Frankel, “Shared generation of authenticators and signatures,” in Advances in Cryptology-Proceedings of CRYPTO’ 91 (J. Feigenbaum, ed.), vol. 576 of Lecture Notes in Computer Science, pp. 457–469, Springer-Verlag, 1992.

    Google Scholar 

  7. Y. Desmedt and S. Jajodia, “Redistributing secret shares to new access structures and its applications,” tech. rep., George Mason University, ISS-TR-97-01, ftp://isse.gmu.edu/pub/techrep/97_01i_jajodia.ps.gz, 1997.

  8. Y. Desmedt and B. King. Verifiable Democracy. In Secure Information Networks, IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99), pages 53–70. Kluwer Academic Publishers, September 1999.

    Google Scholar 

  9. R. Gennaro and S. Micali, “Verifiable Secret Sharing as Secure Computation,” in Advances in Cryptology-Proceedings of EUROCRYPT’ 95 (L. Guillou and J.-J. Quisquater, eds.), vol. 921 of Lecture Notes in Computer Science, pp. 168–182, Springer-Verlag, 1995.

    Google Scholar 

  10. L. Harn, “Group-oriented (t, n) threshold digital signature scheme and digital multisignature,” IEE Proc.-Comput. Digit. Tech., vol. 141, pp. 307–313, Sept. 1994.

    Google Scholar 

  11. P. Horster, M. Michels, and H. Petersen, “Meta-Multisignature schemes based on the discrete logarithm problem,” in Information Security-the Next Decade, (J. H. Eloff and S. H. Solms, eds.), IFIP/Sec’ 95, pp. 128–142, Proceedings of IFIP TC11 eleventh international conference on information security, Chapman and Hall, 1995.

    Google Scholar 

  12. S. Langford, “Threshold DSS Signatures without a Trusted Party,” in Advances in Cryptology-Proceedings of CRYPTO’ 95 (D. Coppersmith, ed.), vol. 963 of Lecture Notes in Computer Science, pp. 397–409, Springer-Verlag, 1995.

    Google Scholar 

  13. M. Reiter, “Secure Agreement Protocols: reliable and atomic group multicast in Rampart,” in Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp. 68–80, 1994.

    Google Scholar 

  14. C. Li, T. Hwang, and N. Lee, “Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders,” in Advances in Cryptology-Proceedings of EUROCRYPT’ 94 (A. Santis, ed.), vol. 950 of Lecture Notes in Computer Science, pp. 194–204, Springer-Verlag, 1995.

    Chapter  Google Scholar 

  15. C. Li, T. Hwang, and N. Lee, “Remark on the Threshold RSA Signature Scheme,” in Advances in Cryptology-Proceedings of CRYPTO’ 93 (D. Stinson, ed.), vol. 773 of Lecture Notes in Computer Science, pp. 413–419, Springer-Verlag, 1994.

    Google Scholar 

  16. C. Park and K. Kurosawa, “New ElGamal Type Threshold Digital Signature Scheme,” IEICE Trans. Fundamentals, vol. E79-A, pp. 86–93, Jan. 1996.

    Google Scholar 

  17. T. Pedersen, “Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing,” in Advances in Cryptology-Proceedings of CRYPTO’ 91 (J. Feigenbaum, ed.), vol. 576 of Lecture Notes in Computer Science, pp. 129–140, Springer-Verlag, 1992.

    Google Scholar 

  18. M. Stadler, “Publicly Verifiable Secret Sharing,” in Advances in Cryptology-Proceedings of EUROCRYPT’ 96 (U. Maurer, ed.), vol. 1070 of Lecture Notes in Computer Science, pp. 190–199, Springer-Verlag, 1996.

    Google Scholar 

  19. A. Shamir, “How to Share a Secret,” Communications of the ACM, vol. 22, pp. 612–613, Nov. 1979.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ghodosi, H., Pieprzyk, J. (2001). Democratic Systems. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_31

Download citation

  • DOI: https://doi.org/10.1007/3-540-47719-5_31

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42300-3

  • Online ISBN: 978-3-540-47719-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics