Undetachable Threshold Signatures

  • Authors:
  • Niklas Borselius;Chris J. Mitchell;Aaron Wilson

  • Affiliations:
  • -;-;-

  • Venue:
  • Proceedings of the 8th IMA International Conference on Cryptography and Coding
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

A major problem of mobile agents is their inability to authenticate transactions in a hostile environment. Users will not wish to equip agents with their private signature keys when the agents may execute on untrusted platforms. Undetachable signatures were introduced to solve this problem by allowing users to equip agents with the means to sign signatures for tightly constrained transactions, using information especially derived from the user private signature key. However, the problem remains that a platform can force an agent to commit to a sub-optimal transaction. In parallel with the work on undetachable signatures, much work has been performedon threshold signature schemes, which allow signing power to be distributed across multiple agents, thereby reducing the trust in a single entity. We combine these notions and introduce the concept of an undetachable threshold signature scheme, which enables constrained signing power to be distributed across multiple agents, thus reducing the necessary trust in single agent platforms. We also provide an RSA-based example of such a scheme basedon a combination of Shoup's threshold signature scheme, [1] and Kotzanikolaou et al's undetachable signature scheme, [2].