2020
DOI: 10.1049/ise2.12007
|View full text |Cite
|
Sign up to set email alerts
|

An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing

Abstract: Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper solutions. The authors address some important features like verifiability and being multi‐stage to make it usable in various field of application. Here, the authors propose an anonymous threshold signature scheme based on the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 45 publications
0
5
0
Order By: Relevance
“…ALGORITHM 1 Committee selection stage. In order to validate the authenticity of the messages, we adopt the secp256k1 cryptography [35,36] instead of the threshold signature techniques [37,38], for the reason that secp256k1 encryption does not require key combining, which is more suitable for our algorithm to have better performance than the threshold signature techniques.…”
Section: Voting Stagementioning
confidence: 99%
“…ALGORITHM 1 Committee selection stage. In order to validate the authenticity of the messages, we adopt the secp256k1 cryptography [35,36] instead of the threshold signature techniques [37,38], for the reason that secp256k1 encryption does not require key combining, which is more suitable for our algorithm to have better performance than the threshold signature techniques.…”
Section: Voting Stagementioning
confidence: 99%
“…Lemma 1 [29] The approximate shortest vector problem and the approximate shortest linearly independent vector problem in lattice are polynomial time unsolvable. For , is a one-way anti-collision hash function, where is the dimension of the integer lattice and is a constant.…”
Section: Latticementioning
confidence: 99%
“…We choose (7), ( 9) and (10). After choosing 3 points, we use Lagrange basis polynomials and obtain (15), ( 16), (17). Therefore, applying (18) with ( 15), ( 16) and (17) we got (19).…”
Section: Proposed Approachmentioning
confidence: 99%
“…After choosing 3 points, we use Lagrange basis polynomials and obtain (15), ( 16), (17). Therefore, applying (18) with ( 15), ( 16) and (17) we got (19). As a result of (19), we successfully reconstruct original data (secret) 4311 with Shamir' Secret Scheme shown in (20).…”
Section: Proposed Approachmentioning
confidence: 99%
See 1 more Smart Citation