A new approach to efficient verifiable secret sharing for threshold KCDSA signature

0Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper is to propose a threshold KCDSA (Korean Certificationbased Digital Signature Algorithm) signature scheme. For this goal we present some new secret sharing schemes and a robust multiplication protocol based on the non-interactive ZK proof. The secret sharing scheme using a hash function can verify the validity of the received data easily, therefore we can reduce the complexity of the protocol. Also we present a robust multiplication protocol of two shared secrets based on non-interactive ZK proof scheme. Players check the validity of the broadcasted shares by using a non-interactive ZK proof, and accept only the correct shares, and then interpolate the polynomial by using the accepted shares. Finally we propose a threshold KCDSA signature, which is composed of key-sharing protocol and signature generation protocol. We prove that the proposed KCDSA signature is a (t, n)-robust threshold protocol, which tolerates up to t eavesdropping and halting faults if the number of players is n ≥ 2t +1.

Cite

CITATION STYLE

APA

Yoon, H. S., & Youm, H. Y. (2000). A new approach to efficient verifiable secret sharing for threshold KCDSA signature. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1787, pp. 208–220). Springer Verlag. https://doi.org/10.1007/10719994_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free