Abstract
Aiming at the security threats and computational complexity of existing threshold signature schemes, this paper proposes a threshold signature scheme based on elliptic curve. The scheme render no less than t legitimate and honest members to form a valid signature, where the signature is combined with the public key of the designated receiver, thus only the designated receiver can verify and decrypt the information by using his or her private key. According to the analysis, the proposed scheme has the characteristics of unforgeability, confidentiality and integrity of messages. Moreover, the scheme has good robustness, consumes less computing resources, and lower communication bandwidth.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457–469. Springer, Heidelberg (1992). https://doi.org/10.1007/3-540-46766-1_37
Ding, K., Ding, C.: A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans. Inf. Theory 11(61), 5835–5842 (2015)
Harn, L.: Group-oriented threshold signature scheme and digital multisignature. IEEE Proc. Comput. Digit. Tech. 141(5), 307–313 (1994)
Asaar, M.R., Salmasizadeh, M., Susilo, W.: A short identity-based proxy ring signature scheme from RSA [EB/OL] (2015)
Karati, A., Biswas, G.P.: Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme. Secur. Commun. Netw. 9(17), 4060–4074 (2016)
Meshram, C.Y., Powar, P.L., Obaidat, M.S.: An UF-IBSS-CMA protected online/offline identity-based short signature technique using PDL [EB/OL] (2017)
Gong, B., Zhang, Y., Wang, Y.: A remote attestation mechanism for the sensing layer nodes of the internet of things. Future Gener. Comput. Syst. 78(3), 867–886 (2018)
Liu, Y., Cheng, C., Gu, T., et al.: A lightweight authenticated communication scheme for smart grid. IEEE Sens. J. 16(3), 836–842 (2016)
Dragan, C.C., Tiplea, F.L.: Distributive weighted threshold secret sharing schemes. Inf. Sci. 339, 85–97 (2016)
Harn, L., Wang, F.: Threshold signature scheme without using polynomial interpolation. IJ Netw. Secur. 18(4), 710–717 (2015)
Li, S., Doh, I., Chae, K.: A group authentication scheme based on Lagrange interpolation polynomial. In: Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS16), pp. 386–391. IEEE (2016)
Lin, H.Y., Hsieh, M.Y., Li, K.C.: Secured map reduce computing based on virtual machine using threshold secret sharing and group signature mechanisms in cloud computing environments. Telecommun. Syst. 60(2), 303–313 (2015)
Xiong, L., Shi, Y.: On the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing. CMC: Comput. Mater. Continua 55(3), 523–539 (2018)
Tang, Y., Lian, H., Zhao, Z., Yan, X.: A proxy re-encryption with keyword search scheme in cloud computing. CMC: Comput. Mater. Continua 56(2), 339–352 (2018)
Barreto, P.S.L.M., Libert, B., Mccullagh, N., et al.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps [EB/OL] (2017)
Xu, F.: Proactive threshold RSA signature scheme based on polynomial secret sharing. J. Electron. Inf. Technol. 38(9), 2280–2286 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, Y., Liu, T. (2019). A Novel Threshold Signature Scheme Based on Elliptic Curve with Designated Verifier. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11635. Springer, Cham. https://doi.org/10.1007/978-3-030-24268-8_31
Download citation
DOI: https://doi.org/10.1007/978-3-030-24268-8_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24267-1
Online ISBN: 978-3-030-24268-8
eBook Packages: Computer ScienceComputer Science (R0)