Communications of the ACM
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
Designs, Codes and Cryptography
1-out-of-n Signatures from a Variety of Keys
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A threshold signature scheme for group communications without a shared distribution center
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
BSADF: Blind Signature Based Anonymous Digital Fingerprint
FSKD '07 Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery - Volume 04
Threshold Cryptosystem and Its Application in Subliminal Channel Scheme
IITA '08 Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 03
General secure multi-party computation from any linear secret-sharing scheme
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
A new (t, n)-threshold multi-secret sharing scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Hi-index | 0.00 |
Threshold signature is an important signature with additional property; it can achieve effective supervision on signature generating and signature verifying. This paper analyzed the basic principles of threshold cryptosystem and its superiority for application in threshold signature schemes. Considering the security threats and system flaws of present signature schemes, we present a threshold signature scheme based on elliptic curves cryptosystem. The scheme achieves threshold generating and verifying of signature by utilizing secret sharing in signature processing, and it also achieves threshold management of identity tracing by identity blinding and probabilistic encryption algorithms. As security proof for the scheme, we present a typical subliminal channel scheme for the threshold signature. The subliminal message can only be generated and recovered by no less than t valid members; so the subliminal channel renders effective supervision on subliminal message and identity secrecy. Further analyses and comparison also justify the brevity, security and high efficiency of the scheme.