{"title":"具有阈值通道的阈值签名方案","authors":"Xuanwu Zhou, Ping Wei","doi":"10.1109/CCDC.2009.5192262","DOIUrl":null,"url":null,"abstract":"Threshold signature is an important signature with additional property; it can achieve effective supervision on signature generating and signature verifying. This paper analyzed the basic principles of threshold cryptosystem and its superiority for application in threshold signature schemes. Considering the security threats and system flaws of present signature schemes, we present a threshold signature scheme based on elliptic curves cryptosystem. The scheme achieves threshold generating and verifying of signature by utilizing secret sharing in signature processing, and it also achieves threshold management of identity tracing by identity blinding and probabilistic encryption algorithms. As security proof for the scheme, we present a typical subliminal channel scheme for the threshold signature. The subliminal message can only be generated and recovered by no less than t valid members; so the subliminal channel renders effective supervision on subliminal message and identity secrecy. Further analyses and comparison also justify the brevity, security and high efficiency of the scheme.","PeriodicalId":127110,"journal":{"name":"2009 Chinese Control and Decision Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Threshold signature scheme with subliminal channel\",\"authors\":\"Xuanwu Zhou, Ping Wei\",\"doi\":\"10.1109/CCDC.2009.5192262\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Threshold signature is an important signature with additional property; it can achieve effective supervision on signature generating and signature verifying. This paper analyzed the basic principles of threshold cryptosystem and its superiority for application in threshold signature schemes. Considering the security threats and system flaws of present signature schemes, we present a threshold signature scheme based on elliptic curves cryptosystem. The scheme achieves threshold generating and verifying of signature by utilizing secret sharing in signature processing, and it also achieves threshold management of identity tracing by identity blinding and probabilistic encryption algorithms. As security proof for the scheme, we present a typical subliminal channel scheme for the threshold signature. The subliminal message can only be generated and recovered by no less than t valid members; so the subliminal channel renders effective supervision on subliminal message and identity secrecy. Further analyses and comparison also justify the brevity, security and high efficiency of the scheme.\",\"PeriodicalId\":127110,\"journal\":{\"name\":\"2009 Chinese Control and Decision Conference\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Chinese Control and Decision Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCDC.2009.5192262\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Chinese Control and Decision Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCDC.2009.5192262","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Threshold signature scheme with subliminal channel
Threshold signature is an important signature with additional property; it can achieve effective supervision on signature generating and signature verifying. This paper analyzed the basic principles of threshold cryptosystem and its superiority for application in threshold signature schemes. Considering the security threats and system flaws of present signature schemes, we present a threshold signature scheme based on elliptic curves cryptosystem. The scheme achieves threshold generating and verifying of signature by utilizing secret sharing in signature processing, and it also achieves threshold management of identity tracing by identity blinding and probabilistic encryption algorithms. As security proof for the scheme, we present a typical subliminal channel scheme for the threshold signature. The subliminal message can only be generated and recovered by no less than t valid members; so the subliminal channel renders effective supervision on subliminal message and identity secrecy. Further analyses and comparison also justify the brevity, security and high efficiency of the scheme.