Robust threshold DSS signatures

被引:79
作者
Gennaro, R
Jarecki, S
Krawczyk, H
Rabin, T
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Heights, NY 10598 USA
[2] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
[3] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
关键词
D O I
10.1006/inco.2000.2881
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present threshold DSS (digital signature standard) signatures where the power to sign is shared by n players such that for a given parameter t < n/2 any subset of 2t + 1 signers can collaborate to produce a valid DSS signature on any given message, but no subset of t corrupted players can forge a signature tin particular, cannot learn the signature key). In addition, we present a robust threshold DSS scheme that can also tolerate n/3 payers who refuse to participate in the signature protocol. We can also endure n/4 maliciously faulty players that generate incorrect partial signatures at the time of signature computation. This results in a highly secure and resilient DSS signature system applicable to the protection of the secret signature key, the prevention of forgery, and increased system availability. Assuming that secret communication between the players is available, we prove the security of our protocols solely based on the hardness of forging a regular DSS signature. (C) 2001 Academic Press.
引用
收藏
页码:54 / 84
页数:31
相关论文
共 41 条
  • [1] BARILAN J, 1994, P ACM S PRINC DISTR, P201
  • [2] BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P377
  • [3] BEAVER D, 1987, TR1287 HARV U
  • [4] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
  • [5] Boyd C., 1986, CRYPTOGRAPHY CODING, P241
  • [6] CANETTI R, 1999, LNCS, V1666, P98
  • [7] CERECEDO M, 1993, IEICE T FUND ELECTR, VE76A, P532
  • [8] Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
  • [9] CROFT RA, 1989, CRYPTOGRAPHY CODING, P189
  • [10] de Santis A., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P522, DOI 10.1145/195058.195405