Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem

Download
116 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_2,
        author={Ya-ge Cheng and Zhi-juan Jia and Bei Gong and Li-peng Wang and Yan-fang Lei},
        title={Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={Strong forward security Threshold signature Chinese remainder theorem Secret sharing},
        doi={10.1007/978-3-030-21373-2_2}
    }
    
  • Ya-ge Cheng
    Zhi-juan Jia
    Bei Gong
    Li-peng Wang
    Yan-fang Lei
    Year: 2019
    Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_2
Ya-ge Cheng1,*, Zhi-juan Jia1,*, Bei Gong2, Li-peng Wang1, Yan-fang Lei1
  • 1: Zhengzhou Normal University
  • 2: Beijing University of Technology
*Contact email: 897373693@qq.com, 13676951984@163.com

Abstract

The traditional cryptosystem is based on the security of private key. While the private key is leaked, the signature information may be exposed. Based on this, a threshold signature scheme with strong forward security based on Chinese remainder theorem is proposed. The signature is generated through the cooperation of members, which solve the problem of authoritative fraud introduced by the dealer. The private key is updated periodically to handle the threat caused by the private key leakage. Security analysis shows that the existing signatures will not be affected by the compromise of the corresponding private keys, and do not allow for forgery of the future signatures, which shows that the new scheme has the forward security and the backward security. The efficiency analysis shows that our scheme is more efficient compared with the well-known existing schemes in the literature.