Threshold signature scheme with subliminal channel

  • Authors:
  • Xuanwu Zhou;Ping Wei

  • Affiliations:
  • Key Laboratory of Network & Information Security of the APF, Engineering College of the APF, Xi'an, P. R. China;Key Laboratory of Network & Information Security of the APF, Engineering College of the APF, Xi'an, P. R. China

  • Venue:
  • CCDC'09 Proceedings of the 21st annual international conference on Chinese Control and Decision Conference
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Threshold signature is an important signature with additional property; it can achieve effective supervision on signature generating and signature verifying. This paper analyzed the basic principles of threshold cryptosystem and its superiority for application in threshold signature schemes. Considering the security threats and system flaws of present signature schemes, we present a threshold signature scheme based on elliptic curves cryptosystem. The scheme achieves threshold generating and verifying of signature by utilizing secret sharing in signature processing, and it also achieves threshold management of identity tracing by identity blinding and probabilistic encryption algorithms. As security proof for the scheme, we present a typical subliminal channel scheme for the threshold signature. The subliminal message can only be generated and recovered by no less than t valid members; so the subliminal channel renders effective supervision on subliminal message and identity secrecy. Further analyses and comparison also justify the brevity, security and high efficiency of the scheme.