File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
  • Find via Find It@HKUL
Supplementary

Article: Multiplicative forward-secure threshold signature scheme

TitleMultiplicative forward-secure threshold signature scheme
Authors
KeywordsAd-hoc network
Forward secure threshold signature
Forward security
Multiplicative sharing
Issue Date2008
PublisherFemto Technique Co., Ltd. The Journal's web site is located at http://ijns.femto.com.tw
Citation
International Journal of Network Security, 2008, v. 7 n. 3, p. 397-403 How to Cite?
AbstractThe devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, forward-secure signature schemes and threshold signature schemes are devised. In this paper, we propose a robust forward-secure threshold signature scheme with the applicability to mobile ad-hoc network in mind. Our main objective is to reduce interaction among the set of signers and to reduce the dependency on broadcast as well as private point-to-point connections. We achieve this by avoiding the regular polynomial sharing and employing multiplicative sharing in a threshold structure. The security of our proposed threshold scheme is reducible to the security of a single-user scheme, which has been proven secure under the random oracle model.
Persistent Identifierhttp://hdl.handle.net/10722/60616
ISSN
2015 SCImago Journal Rankings: 0.507

 

DC FieldValueLanguage
dc.contributor.authorChow, SSMen_HK
dc.contributor.authorGo, HWen_HK
dc.contributor.authorHui, LCKen_HK
dc.contributor.authorYiu, SMen_HK
dc.date.accessioned2010-05-31T04:15:03Z-
dc.date.available2010-05-31T04:15:03Z-
dc.date.issued2008en_HK
dc.identifier.citationInternational Journal of Network Security, 2008, v. 7 n. 3, p. 397-403en_HK
dc.identifier.issn1816-353X-
dc.identifier.urihttp://hdl.handle.net/10722/60616-
dc.description.abstractThe devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, forward-secure signature schemes and threshold signature schemes are devised. In this paper, we propose a robust forward-secure threshold signature scheme with the applicability to mobile ad-hoc network in mind. Our main objective is to reduce interaction among the set of signers and to reduce the dependency on broadcast as well as private point-to-point connections. We achieve this by avoiding the regular polynomial sharing and employing multiplicative sharing in a threshold structure. The security of our proposed threshold scheme is reducible to the security of a single-user scheme, which has been proven secure under the random oracle model.-
dc.languageengen_HK
dc.publisherFemto Technique Co., Ltd. The Journal's web site is located at http://ijns.femto.com.tw-
dc.relation.ispartofInternational Journal of Network Securityen_HK
dc.subjectAd-hoc network-
dc.subjectForward secure threshold signature-
dc.subjectForward security-
dc.subjectMultiplicative sharing-
dc.titleMultiplicative forward-secure threshold signature schemeen_HK
dc.typeArticleen_HK
dc.identifier.openurlhttp://library.hku.hk:4550/resserv?sid=HKU:IR&issn=1816-353X&volume=7&issue=3&spage=397&epage=403&date=2008&atitle=Multiplicative+forward-secure+threshold+signature+scheme-
dc.identifier.emailChow, SSM: schow@cs.nyu.eduen_HK
dc.identifier.emailGo, HW: hwgo@cs.hku.hken_HK
dc.identifier.emailHui, LCK: hui@cs.hku.hken_HK
dc.identifier.emailYiu, SM: smyiu@cs.hku.hk-
dc.identifier.authorityHui, LCK=rp00120en_HK
dc.identifier.authorityYiu, SM=rp00207en_HK
dc.identifier.hkuros161474en_HK
dc.identifier.volume7-
dc.identifier.issue3-
dc.identifier.spage397-
dc.identifier.epage403-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats