{"title":"Threshold signature scheme with subliminal channel","authors":"Xuanwu Zhou, Ping Wei","doi":"10.1109/CCDC.2009.5192262","DOIUrl":null,"url":null,"abstract":"Threshold signature is an important signature with additional property; it can achieve effective supervision on signature generating and signature verifying. This paper analyzed the basic principles of threshold cryptosystem and its superiority for application in threshold signature schemes. Considering the security threats and system flaws of present signature schemes, we present a threshold signature scheme based on elliptic curves cryptosystem. The scheme achieves threshold generating and verifying of signature by utilizing secret sharing in signature processing, and it also achieves threshold management of identity tracing by identity blinding and probabilistic encryption algorithms. As security proof for the scheme, we present a typical subliminal channel scheme for the threshold signature. The subliminal message can only be generated and recovered by no less than t valid members; so the subliminal channel renders effective supervision on subliminal message and identity secrecy. Further analyses and comparison also justify the brevity, security and high efficiency of the scheme.","PeriodicalId":127110,"journal":{"name":"2009 Chinese Control and Decision Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Chinese Control and Decision Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCDC.2009.5192262","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Threshold signature is an important signature with additional property; it can achieve effective supervision on signature generating and signature verifying. This paper analyzed the basic principles of threshold cryptosystem and its superiority for application in threshold signature schemes. Considering the security threats and system flaws of present signature schemes, we present a threshold signature scheme based on elliptic curves cryptosystem. The scheme achieves threshold generating and verifying of signature by utilizing secret sharing in signature processing, and it also achieves threshold management of identity tracing by identity blinding and probabilistic encryption algorithms. As security proof for the scheme, we present a typical subliminal channel scheme for the threshold signature. The subliminal message can only be generated and recovered by no less than t valid members; so the subliminal channel renders effective supervision on subliminal message and identity secrecy. Further analyses and comparison also justify the brevity, security and high efficiency of the scheme.