A proactive secret sharing for server assisted threshold signatures

Jong Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Threshold signature schemes distribute secret information to several servers and make the whole system that maintains the secret information fault-tolerant. Since threshold signature schemes typically assume that the shared signing function can only be activated by a quorum number of servers. If anyone has a power to activate the signing function of servers, he can easily compute valid signatures for a specific organization without knowing the private key. S. Xu et al. proposed a general construction to build threshold signature schemes (called as server assisted threshold signatures) which provide an organization (e.g., a user) with controllability for activating his private signing function in a certain enhanced way. In this paper, we newly propose proactive secret sharing schemes which are suitable for server-assisted threshold signatures.

Original languageEnglish
Title of host publicationHigh Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings
PublisherSpringer Verlag
Pages250-259
Number of pages10
ISBN (Print)3540393684, 9783540393689
Publication statusPublished - Jan 1 2006
Event2nd International Conference on High Performance Computing and Communications, HPCC 2006 - Munich, Germany
Duration: Sep 13 2006Sep 15 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4208 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd International Conference on High Performance Computing and Communications, HPCC 2006
CountryGermany
CityMunich
Period9/13/069/15/06

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A proactive secret sharing for server assisted threshold signatures'. Together they form a unique fingerprint.

  • Cite this

    Yang, J. P., Rhee, K. H., & Sakurai, K. (2006). A proactive secret sharing for server assisted threshold signatures. In High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings (pp. 250-259). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4208 LNCS). Springer Verlag.