Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms (Special Section on Discrete Mathematics and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we discuss secure protocols for shared computation of algorithms associated with digital signature schemes based on discrete logarithms. Generic solutions to the problem of cooperatively computing arbitrary functions, though formally provable according to strict security notions, are inefficient in terms of communication -bits and rounds of interaction-; practical protocols for shared computation of particular functions, on the other hand, are often shown secure according to weaker notions of security. We propose efficient secure protocols to share the generation of keys and signatures in the digital signature schemes introduced by Schnorr (1989) and ElGamal (1985). The protocols are built on a protocol for non-interactive verifiable secret sharing (Feldman, 1987) and a novel construction for non-interactively multiplying secretly shared values. Together with the non-interactive protocols for shared generation of RSA signatures introduced by Desmedt and Frankel (1991), the results presented here show that practical signature schemes can be efficiently shared.
- 社団法人電子情報通信学会の論文
- 1993-04-25
著者
-
Imai H
Research Center For Information Security (rcis):national Institute Of Advanced Industrial Science An
-
IMAI Hideki
the Institute of Industrial Science, The University of Tokyo
-
Cerecedo M
Faculty Of Engineering Yokohama National University
-
Cerecedo Manuel
the Faculty of Engineering, Yokohama National University
-
Matsumoto Tsutomu
the Faculty of Engineering, Yokohama National University
-
Imai H
Chuo University
-
Matsumoto T
Yokohama National Univ. Yokohama‐shi Jpn
-
Matsumoto Tsutomu
The Faculty Of Engineering Yokohama National University
-
Imai Hideki
The Institute Of Industrial Science The University Of Tokyo
関連論文
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- Tradeoffs between Error Performance and Decoding Complexity in Multilevel 8-PSK Codes with UEP Capabilities and Multistage Decoding
- Unconditionally Secure Chaffing-and-Winnowing
- Shared Pseudo-Random Secret Generation Protocols (Special Section on Discrete Mathematics and Its Applications)
- Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms (Special Section on Discrete Mathematics and Its Applications)
- Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6
- An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
- Anonymous Password-Authenticated Key Exchange : New Construction and Its Extensions
- A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
- A New Security Architecture for Personal Networks and Its Performance Evaluation
- RSA-Based Password-Authenticated Key Exchange, Revisited
- A Secure Authenticated Key Exchange Protocol for Credential Services
- An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction(Information Security)
- New Security Architecture for Mobile IPv6 Networks
- Notes on Formal Methods Used for Verification of the Security Properties of Protocols Used in Wireless Environment
- A Leakage-Resilient Network Storage System
- Security Analysis of Password-based Protocols via FDR and AVISPA
- A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications(Information Security)
- An Efficient Leakage-Resilient Authenticated Key Exchange Protocol
- A Secure and Lightweight Authenticated Key Exchange Protocol for Wireless Networks
- Towards Removing Random Oracles from OAEP
- Asymptotic Bounds for Unidirectional Byte Error-Correcting Codes (Special Section on Information Theory and Its Applications)
- Construction Techniques for Error-Control Runlength-Limited Block Codes
- Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions(Special Section on Cryptography and Information Security)
- Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher(Special Section on Cryptography and Information Security)
- Compact Encoding of the Web Graph Exploiting Various Power Distributions(Discrete Mathematics and Its Applications)
- Sliced Onion Routing Scheme and its Aptitude for Sender-Identifiable Environments
- Optimally Mastering Keys in Various Broadcast Encryption Schemes
- Personal Entropy from Graphical Passwords : Methods for Quantification and Practical Key Generation(Cryptography and Information Security)(Information Theory and Its Applications)
- Finding Neighbor Communities in the Web Using an Inter-Site Graph(Database)
- Managing Encryption and Key Publication Independently in Digital Rights Management Systems (Applications) (Cryptography and Information Security)
- On Evaluating the Entropy of Graphical Passwords
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- Coded Modulation for Satellite Digital Video Broadcasting (Special Section on Information Theory and Its Applications)
- Semantically Secure McEliece Phblic-Key Cryptosystem(Special Section on Cryptography and Information Security)
- An Error-Controlling Scheme according to the Importance of Individual Segments of Model-Based Coded Facial Images (Special Section on Information Theory and Its Applications)
- Variable Error Controlling Schemes for Intelligent Error Controlling Systems (Special Section on Information Theory and Its Applications)
- New Short Signature Scheme without Random Oracles
- A Trade-off Traitor Tracing Scheme
- On Collusion Security of Random Codes(Biometrics)(Cryptography and Information Security)
- Collusion Secure Codes : Systematic Security Definitions and Their Relations(Discrete Mathematics and Its Applications)
- Clone Match Rate Evaluation for an Artifact-metric System (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- Multi-Dimensional Turbo Codes: Performance and Simplified Decoding Structure
- Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols
- Reliability-Based Decoding Algorithm in Multistage Decoding of Multilevel Codes(Special Section on Information Theory and Its Applications)
- Methods to Securely Realize Caller-Authenticated and Callee-Specified Telephone Calls (Special Section on Cryptography and Information Security)
- A Fast Automatic Fingerprint Identification Method Based on a Weighted-Mean of Binary Image (Special Section on Information Theory and Its Applications)
- Viterbi Decoding Considering Synchronization Errors (Special Section on Information Theory and Its Applications)
- An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation
- Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks