Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
Libert B., Joye M., Yung M. Theoretical Computer Science645 (C):1-24,2016.Type:Article
Date Reviewed: Jan 13 2017

Libert et al. develop a fully distributed, non-interactive, adaptively secure threshold signature scheme with scalable share size.

A threshold cryptosystem enhances the security and availability of public-key schemes by dividing a private key into n shares such that a set of at least t+1 shares is needed to produce a valid private key. If the shares are distributed among n servers, any subset of t+1 servers can produce a digital signature when authorized. Currently, most practical threshold signature schemes have several drawbacks: “they have [only] been analyzed in a ... model where the set of corrupted servers is fixed at the beginning”; they require interaction among the servers; they are not fully distributed by assuming a trusted dealer in the key generation phase; and they require substantial storage.

The authors develop a system that significantly improves on prior solutions by eliminating these drawbacks. In their system, no trusted dealer who assembles the shares is required; hence their solution is fully distributed. According to the paper, “servers can compute their partial signatures without communication with other servers.” The system can tolerate an adversary that can corrupt servers dynamically; private shares are of constant size, independent of the number of servers; and only certain solutions incur O(n) storage cost at the servers. Finally and maybe most importantly, their solution does not require erasure.

Reviewer:  Burkhard Englert Review #: CR144996 (1704-0235)
Bookmark and Share
  Featured Reviewer  
 
Public Key Cryptosystems (E.3 ... )
 
 
Cryptographic Controls (D.4.6 ... )
 
 
Security (K.4.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Public Key Cryptosystems": Date
Direct demonstration of the power to break public-key cryptosystems
Koyama K.  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)211990. Type: Proceedings
Sep 1 1991
Public-key cryptography
Salomaa A., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9783540528319)
Feb 1 1992
Computation of discrete logarithms in prime fields
LaMacchia B., Odlyzko A. Designs, Codes and Cryptography 1(1): 47-62, 1991. Type: Article
Apr 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy