A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree

Forward secure threshold signature plays an important role in distributed signature. Based on binary tree structure, a new forward secure threshold signature from bilinear pairings is proposed in this paper. In this scheme, each cost of key generation algorithm, key update algorithm, signing algorithm and verifying algorithm is independent of the total number of time periods. At the same time, the scheme needs very few interactions. Because the bilinear pairing used in this scheme is operating over a certain elliptic curve, the scheme inherits the property of short signature, that is, it has short secret key, public key and signature. We formalize the definition of the security model of forward secure threshold signature and prove the proposed scheme is forward secure under the computation Diffie-Hellman assumption in the random oracle model.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Leonid Reyzin,et al.  A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.

[3]  Ross J. Anderson,et al.  Two remarks on public key cryptology , 2002 .

[4]  Je Hong Park,et al.  A New Forward Secure Signature Scheme , 2004, IACR Cryptol. ePrint Arch..

[5]  Wen-Guey Tzeng,et al.  Robust Forward-Secure Signature Schemes with Proactive Security , 2001, Public Key Cryptography.

[6]  于佳,et al.  An Efficient Forward Secure Signature Scheme , 2006 .

[7]  Mihir Bellare,et al.  A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.

[8]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[9]  Yu Jia An Efficient Forward Secure Signature Scheme , 2006 .

[10]  Jan Camenisch,et al.  Fine-grained forward-secure signature schemes without random oracles , 2006, Discret. Appl. Math..

[11]  Hugo Krawczyk,et al.  Robust Threshold DSS Signatures , 1996, Inf. Comput..

[12]  Craig Gentry,et al.  Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.

[13]  Hugo Krawczyk,et al.  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, Journal of Cryptology.

[14]  Leonid Reyzin,et al.  Forward-Secure Signatures with Fast Key Update , 2002, SCN.

[15]  Fei Hu,et al.  A New Forward Secure Signature Scheme using Bilinear Maps , 2003, IACR Cryptol. ePrint Arch..

[16]  Hovav Shacham,et al.  Available from the IACR Cryptology ePrint Archive as Report 2006/297. Forward-Secure Signatures with Untrusted Update , 2006 .

[17]  Hong Wang,et al.  Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[18]  Chanathip Namprempre,et al.  Forward-Secure Threshold Signature Schemes , 2001, CT-RSA.

[19]  Hong Jingxin A New Forward-Secure Digital Signature Scheme , 2007, 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID).

[20]  Markus Jakobsson,et al.  Proactive public key and signature systems , 1997, CCS '97.

[21]  Hugo Krawczyk,et al.  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems , 1999, EUROCRYPT.

[22]  Gene Itkis,et al.  Forward-Secure Signatures with Optimal Signing and Verifying , 2001, CRYPTO.

[23]  Wen-Guey Tzeng,et al.  A Threshold GQ Signature Scheme , 2003, ACNS.

[24]  Rong Hao,et al.  Forward Secure Threshold Signature Scheme from Bilinear Pairings , 2006, CIS.