GROUP-ORIENTED (T,N) THRESHOLD DIGITAL SIGNATURE SCHEME AND DIGITAL MULTISIGNATURE

被引:197
作者
HARN, L
机构
[1] Univ of Missouri - Kansas City, Kansas City
来源
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES | 1994年 / 141卷 / 05期
关键词
THRESHOLD CRYPTOSYSTEM; DIGITAL SIGNATURE; MULTISIGNATURE; SIGNATURE VERIFICATION;
D O I
10.1049/ip-cdt:19941293
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents group-oriented (t, n) threshold digital signature schemes based on the difficulty of solving the discrete logarithm problem. By employing these schemes, any t out of n users in a group can represent this group to sign the group signature. The size of the group signature and the verification time of the group signature are equivalent to that of an individual digital signature. In other words, the (t, n) threshold signature scheme has the following five properties: (i) any group signature is mutually generated by at least t group members; (ii) the size of the group signature is equivalent to the size of an individual signature; (iii) the signature verification process is simplified because there is only one group public key required; (iv) the group signature can be verified by any outsider; and (v) the group holds the responsibility to the signed message. In addition to the above properties, two of the schemes proposed do not require the assistance of a mutually trusted party. Each member selects its own secret key and the group public key is determined by all group members. Each group member signs a message separately and sends the individual signature to. a designated clerk. The clerk validates each individual signature and then combines all individual signatures into a group signature. The (n, n) threshold signature scheme can be easily extended to become a digital multi-signature scheme.
引用
收藏
页码:307 / 313
页数:7
相关论文
共 20 条
[1]   IMPROVED DIGITAL SIGNATURE SCHEME BASED ON DISCRETE EXPONENTIATION [J].
AGNEW, GB ;
MULLIN, RC ;
VANSTONE, SA .
ELECTRONICS LETTERS, 1990, 26 (14) :1024-1025
[2]  
BOYD C, 1986, DEC P C COD CRYPT CI
[3]  
Chaum D., 1991, Advances in Cryptology - EUROCRYPT '91. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P257
[4]  
DESMEDT Y, 1988, LECT NOTES COMPUT SC, V293, P120
[5]  
DESMEDT Y, 1990, LECT NOTES COMPUT SC, V435, P307
[6]  
DESMEDT Y, 1991, ADV CRYPTOLOGY
[7]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[8]  
FRANKEL Y, 1989, LNCS, V434, P56, DOI DOI 10.1007/3-540-46885-48
[9]  
HARN L, 1992, ADV CRYPTOLOGY
[10]  
HWANG T, 1990, ADV CRYPTOLOGY, P352