Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2006, Vol. 29 ›› Issue (s2): 24-29.doi: 10.13190/jbupt.2006s2.24.295

• Papers • Previous Articles     Next Articles

A Forward-Secure Proactive Threshold Signature Scheme

YU Jia1; HAO Rong1,2; ZHAO Zhi-gang1; LI DA-xing2   

  1. 1.College of Information Engineering, Qingdao University, Qingdao 266071,China
    2.Institute of Network Security, Shandong University, Jinan 250100,China
  • Received:2006-09-06 Revised:1900-01-01 Online:2006-11-30 Published:2006-11-30
  • Contact: YU Jia

Abstract:

The formal definition of forward-secure proactive threshold signature scheme is presented, and a concrete scheme is described. The scheme has all the forward-secure properties. The whole lifetime of the signatures is divided into several time periods, the secret key is updated in each time period, and the update function is just one-way. Therefore, the adversary knows no secret keys for previous time periods even if she has got the current secret key. The public key is fixed during the whole lifetime. At the same time, the scheme has all the properties of proactive security. It can renew shares periodically, detect malicious actions, and recover bad shares. The scheme has the great significance: If an attacker can’t break into no fewer than threshold severs in one period, she can’t forge any signature for the current time period; even if she can break into threshold severs, she can’t forge any signature for previous time periods.

Key words: verifiable secret sharing, forward security, proactive security;threshold scheme

CLC Number: