Sciweavers

Share
CTRSA
2001
Springer

Forward-Secure Threshold Signature Schemes

10 years 7 months ago
Forward-Secure Threshold Signature Schemes
We consider the usage of forward security with threshold signature schemes. This means that even if more than the threshold number of players are compromised, some security remains: it is not possible to forge signatures relating to the past. In this paper, we describe the first forward-secure threshold signature schemes whose parameters (other than signing or verifying time) do not vary in length with the number of time periods in the scheme. Both are threshold versions of the Bellare-Miner forward-secure signature scheme, which is Fiat-Shamir-based. One scheme uses multiplicative secret sharing, and tolerates mobile eavesdropping adversaries. The second scheme is based on polynomial secret sharing, and we prove it forward-secure based on the security of the Bellare-Miner scheme. We then sketch modifications which would allow this scheme to tolerate malicious adversaries. Finally, we give several general constructions which add forward security to any existing threshold scheme.
Michel Abdalla, Sara K. Miner, Chanathip Namprempr
Added 28 Jul 2010
Updated 28 Jul 2010
Type Conference
Year 2001
Where CTRSA
Authors Michel Abdalla, Sara K. Miner, Chanathip Namprempre
Comments (0)
books