Non-Interactive Forward-Secure Threshold Signature without Random Oracles

Forward-secure threshold signature is one kind of important distributed signatures. In a (t, n) forward-secure threshold signature, if an adversary attacks fewer than t players, she cannot forge any valid signature; even if an adversary attacks t or more players in some time period, she cannot forge the signatures of previous time periods. At present, all forward-secure threshold schemes are at most proven to be secure in the random oracle model. However, security in the random oracle model does not imply security in the real world. In this work, we proposed the first forward-secure threshold signature scheme that can be proven secure without random oracles. In this scheme, the complexity of any performance parameter is at most log-squared in terms of the total number of time periods T. Another important point that differentiates our scheme from previous schemes is that our scheme does not need any interaction among the players in key update and signing algorithms. Therefore, the players can update their shares and sign the message, possibly in a completely decentralized fashion, which is very valuable in ad-hoc circumstances.

[1]  Kong Fan,et al.  Forward-Secure Multi-Signature in the Standard Model:Security Model and Construction , 2010 .

[2]  Hugo Krawczyk,et al.  Simple forward-secure signatures from any signature scheme , 2000, IACR Cryptol. ePrint Arch..

[3]  Hugo Krawczyk,et al.  Robust Threshold DSS Signatures , 1996, Inf. Comput..

[4]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[5]  Rong Hao,et al.  New Forward-Secure Signature Scheme with Untrusted Update , 2011, J. Inf. Sci. Eng..

[6]  Rong Hao,et al.  Forward-Secure Identity-Based Public-Key Encryption without Random Oracles , 2011, Fundam. Informaticae.

[7]  Shai Halevi,et al.  Secure Hash-and-Sign Signatures Without the Random Oracle , 1999, EUROCRYPT.

[8]  Chanathip Namprempre,et al.  Forward-Secure Threshold Signature Schemes , 2001, CT-RSA.

[9]  Gene Itkis,et al.  Forward-Secure Signatures with Optimal Signing and Verifying , 2001, CRYPTO.

[10]  Rong Hao,et al.  Forward Secure Threshold Signature Scheme from Bilinear Pairings , 2006, CIS.

[11]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[12]  Rong Hao,et al.  Forward-secure identity-based signature: Security notions and construction , 2011, Inf. Sci..

[13]  Mihir Bellare,et al.  A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.

[14]  Tal Malkin,et al.  Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods , 2002, EUROCRYPT.

[15]  Rong Hao,et al.  Forward-Secure Multi-Signature in the Standard Model: Security Model and Construction: Forward-Secure Multi-Signature in the Standard Model: Security Model and Construction , 2011 .

[16]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[17]  Leonid Reyzin,et al.  A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.