Title :
A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
Author :
Van Der Merwe, Johann ; Dawoud, Dawoud S. ; McDonald, Stephen
Author_Institution :
Sch. of Electr. Electron. & Comput. Eng., Univ. of KwaZulu-Natal, Durban
fDate :
4/1/2007 12:00:00 AM
Abstract :
Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold (t) or more group members to collaboratively sign an arbitrary message. In contrast to threshold group signatures, the individual signers do not remain anonymous, but are publicly identifiable from the information contained in the valid threshold-multisignature. The main objective of this paper is to propose such a secure and efficient threshold-multisignature scheme. The paper uniquely defines the fundamental properties of threshold-multisignature schemes and shows that the proposed scheme satisfies these properties and eliminates the latest attacks to which other similar schemes are subject. The efficiency of the proposed scheme is analyzed and shown to be superior to its counterparts. The paper also proposes a discrete logarithm based distributed-key management infrastructure (DKMI), which consists of a round optimal, publicly verifiable, distributed-key generation (DKG) protocol and a one round, publicly verifiable, distributed-key redistribution/ updating (DKRU) protocol. The round optimal DKRU protocol solves a major problem with existing secret redistribution/updating schemes by giving group members a mechanism to identify malicious or faulty share holders in the first round, thus avoiding multiple protocol executions
Keywords :
digital signatures; groupware; private key cryptography; protocols; public key cryptography; arbitrary message; collaboratively sign; discrete logarithm; distributed-key generation protocol; distributed-key management infrastructure; distributed-key redistribution-updating protocol; faulty share holders; malicious share holders; multiple protocol executions; publicly verifiable; round optimal; secure threshold-multisignature scheme; threshold group-oriented signature schemes; Collaboration; Cryptographic protocols; Cryptography; Digital signatures; Distributed computing; Distributed power generation; Fault diagnosis; Power system management; Power system protection; Security; Security and protection; distributed systems; distributed-key management infrastructure; group-oriented cryptography; publicly verifiable distributed-key generation; publicly verifiable distributed-key redistribution.; publicly verifiable distributed-key update; secret sharing; threshold-multisignature;
Journal_Title :
Parallel and Distributed Systems, IEEE Transactions on
DOI :
10.1109/TPDS.2007.1005