Abstract
Several threshold RSA signature schemes have been proposed, in particular the schemes [4,8] and [20]. Recent research has shown that the earlier schemes [4,8] may be in some cases more “efficient” than these later schemes. Here we describe efficient implementations of threshold RSA schemes as well as further enhancements to improve performance of the Desmedt-Frankel scheme. Our conclusion is that if memory is not an issue there will be situations, for example if one can expect shareholders know who will be participating in the signature generation, that the Desmedt-Frankel scheme is very efficient.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Boneh, D., Franklin, M.: Efficient Generation of Shared RSA Keys. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 425–439. Springer, Heidelberg (1997)
Cramer, R., Fehr, S.: Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 272. Springer, Heidelberg (2002)
Damgard, I., Koprowski, M.: Practical Threshold RSA Signatures without a Trusted Dealer. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 152–165. Springer, Heidelberg (2001)
De Santis, A., Desmedt, Y., Frankel, Y., Yung, M.: How to share a function. In: Proceedings of the twenty-sixth annual ACM Symp. Theory of Computing (STOC), pp. 522–533 (1994)
Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)
Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457–469. Springer, Heidelberg (1992)
Desmedt, Y., King, B.: Verifiable Democracy - a protocol to secure an electronic legislature. In: Traunmüller, R., Lenk, K. (eds.) EGOV 2002. LNCS, vol. 2456, pp. 400–403. Springer, Heidelberg (2002)
Desmedt, Y., Frankel, Y.: Homomorphic zero-knowledge threshold schemes over any finite abelian group. Siam J. Disc. Math. 7(4), 667–679 (1994)
Desmedt, Y., King, B., Kishimoto, W., Kurosawa, K.: A comment on the efficiency of secret sharing scheme over any finite abelian group. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 391–402. Springer, Heidelberg (1998)
Frankel, Y., Gemmel, P., Mackenzie, P., Yung, M.: Proactive RSA. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 440–454. Springer, Heidelberg (1997)
Frankel, Y., Gemmel, P., Mackenzie, P., Yung, M.: Optimal-Resilience Proactive Public-key Cryptosystems. In: Proc. 38th FOCS, pp. 384–393. IEEE, Los Alamitos (1997)
Frankel, Y., MacKenzie, P., Yung, M.: Robust Efficient Distributed RSA-Key Generation. In: STOC 1998, pp. 663–672 (1998)
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust and efficient sharing of RSA functions. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 157–172. Springer, Heidelberg (1996)
King, B.: Algorithms to speed up computations in threshold RSA. In: Australasian Conference on Information Security and Privacy, pp. 443-456 (2000)
King, B.: Improved Methods to Perform Threshold RSA. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 359–372. Springer, Heidelberg (2000)
Keng, H.L.: Introduction to Number Theory. Springer, Heidelberg (1982)
Rabin, T.: A Simplified Approach to threshold and proactive RSA. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, p. 89. Springer, Heidelberg (1998)
Rivest, R., Shamir, A., Adelman, L.: A method for obtaining digital signatures and public key cryptosystems. Comm. ACM 21, 294–299 (1978)
Shamir, A.: How to share a secret. Comm. ACM 22, 612–613 (1979)
Shoup, V.: Practical Threshold Signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207–220. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
King, B. (2005). An Efficient Implementation of a Threshold RSA Signature Scheme. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_32
Download citation
DOI: https://doi.org/10.1007/11506157_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26547-4
Online ISBN: 978-3-540-31684-8
eBook Packages: Computer ScienceComputer Science (R0)