Robust forward-secure signature schemes with proactive security

Wen-Guey Tzeng, Zhi Jia Tzeng

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Scopus citations

Abstract

The secret key of a forward-secure signature scheme evolves at regular intervals, but the public key is fixed during the lifetime of the system. This paper enhances the security of Abdalla and Reyzin’s forward-secure signature scheme via threshold and proactive mechanisms. In our threshold forward-secure signature scheme, we combine multiplicative and polynomial secret sharing schemes to form a threshold forward-secure signature scheme. We develop a special proof system to prove robustness of our scheme.

Original languageEnglish
Title of host publicationPublic Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Proceedings
EditorsKwangjo Kim
PublisherSpringer Verlag
Pages264-276
Number of pages13
ISBN (Electronic)3540416587, 9783540416586
DOIs
StatePublished - 1 Jan 2001
Event4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 - Cheju Island, Korea, Republic of
Duration: 13 Feb 200115 Feb 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1992
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001
CountryKorea, Republic of
CityCheju Island
Period13/02/0115/02/01

Keywords

  • Forward security
  • Proactive
  • Signature
  • Threshold

Fingerprint Dive into the research topics of 'Robust forward-secure signature schemes with proactive security'. Together they form a unique fingerprint.

Cite this