Abstract.In a society oriented cryptography it is better to have a public key for the company (organization) than having one for each individual employee [.es88]. Certainly in emergency situations, power is shared in many organizations.Solutions to this problem were presented [.e.s88], based on [GMW87], but are completely impractical and intemctive. In this paper practical non-intemctiue public key systems are proposed which allow the reuse of the shared secret key since the key is not revealed either to insiders or to outsiders.
Often it is desired that the power to sign or authenticate messages is shared. This paper presents methods to collectively generate RSA signatures, provably secure authenticators and unconditionally secure authenticators. In the new schemes, 1 individuals are given shares such that k 5 1 are needed to generate a signature (authenticator) but less than k can not. When the k people have finished signing (authenticating), nobody can perform an impersonation or substitution attack. These schemes are called threshold signature (authentication) schemes. Clearly these schemes are better than each of the L individuals sending a separate authenticator for each message or if each of the L individuals each send their share to a "trusted" person who will sign for them.In all of the schemes we assume that the shareholders (senders) and receiver have secure workstations but the network and servers are not necessarily secure.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.