{"title":"A New Forward-Secure Threshold Signature Scheme Based on Schnorr Cryptosystem","authors":"Guosheng Cheng, Cuilan Yun","doi":"10.1109/CIS.2007.18","DOIUrl":null,"url":null,"abstract":"Based on Schnorr cryptosystem, this paper proposes a new forward-secure threshold signature scheme. It ensures that both the signature's secret key and the signature are forward-secure through efficiently hiding the current secret key in the signature phase and using the time-parameter effectively in the verification phase. This scheme has the new property that it is infeasible for an attacker to forge any valid signature pertaining to the past even if he has corrupted up to more than or equal to the threshold members and has obtained the current key. It is also proven to be forward secure based on the hardness of factoring in the random oracle model.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2007.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Based on Schnorr cryptosystem, this paper proposes a new forward-secure threshold signature scheme. It ensures that both the signature's secret key and the signature are forward-secure through efficiently hiding the current secret key in the signature phase and using the time-parameter effectively in the verification phase. This scheme has the new property that it is infeasible for an attacker to forge any valid signature pertaining to the past even if he has corrupted up to more than or equal to the threshold members and has obtained the current key. It is also proven to be forward secure based on the hardness of factoring in the random oracle model.