An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing

Abstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper s...

Full description

Bibliographic Details
Main Authors: Hossein Pilaram, Taraneh Eghlidos, Rahim Toluee
Format: Article
Language:English
Published: Wiley 2021-01-01
Series:IET Information Security
Online Access:https://doi.org/10.1049/ise2.12007
id doaj-ff2408c4edd74bef96cb2cb6a9fc034f
record_format Article
spelling doaj-ff2408c4edd74bef96cb2cb6a9fc034f2021-07-14T13:25:19ZengWileyIET Information Security1751-87091751-87172021-01-011519810610.1049/ise2.12007An efficient lattice‐based threshold signature scheme using multi‐stage secret sharingHossein Pilaram0Taraneh Eghlidos1Rahim Toluee2Department of Electrical Engineering Sharif University of Technology Tehran IranElectronics Research Institute Sharif University of Technology Tehran IranDepartment of Electrical Engineering Sharif University of Technology Tehran IranAbstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper solutions. The authors address some important features like verifiability and being multi‐stage to make it usable in various field of application. Here, the authors propose an anonymous threshold signature scheme based on the trapdoor function introduced by Micciancio and Peikert by sharing the private key using a lattice‐based threshold multi‐stage secret sharing (TMSSS) scheme. Then, the authors improve the previously proposed TMSSS scheme, in such a way that less public values are required to publish on the bulletin board which makes the scheme more efficient while preserving the security of the scheme based on the lattice hard problems. The proposed scheme inherits the desired features such as anonymity and verifiability from the improved TMSSS scheme. Furthermore, both schemes use simple matrix operations, which additionally increase the efficiency.https://doi.org/10.1049/ise2.12007
collection DOAJ
language English
format Article
sources DOAJ
author Hossein Pilaram
Taraneh Eghlidos
Rahim Toluee
spellingShingle Hossein Pilaram
Taraneh Eghlidos
Rahim Toluee
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
IET Information Security
author_facet Hossein Pilaram
Taraneh Eghlidos
Rahim Toluee
author_sort Hossein Pilaram
title An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
title_short An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
title_full An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
title_fullStr An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
title_full_unstemmed An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
title_sort efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
publisher Wiley
series IET Information Security
issn 1751-8709
1751-8717
publishDate 2021-01-01
description Abstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper solutions. The authors address some important features like verifiability and being multi‐stage to make it usable in various field of application. Here, the authors propose an anonymous threshold signature scheme based on the trapdoor function introduced by Micciancio and Peikert by sharing the private key using a lattice‐based threshold multi‐stage secret sharing (TMSSS) scheme. Then, the authors improve the previously proposed TMSSS scheme, in such a way that less public values are required to publish on the bulletin board which makes the scheme more efficient while preserving the security of the scheme based on the lattice hard problems. The proposed scheme inherits the desired features such as anonymity and verifiability from the improved TMSSS scheme. Furthermore, both schemes use simple matrix operations, which additionally increase the efficiency.
url https://doi.org/10.1049/ise2.12007
work_keys_str_mv AT hosseinpilaram anefficientlatticebasedthresholdsignatureschemeusingmultistagesecretsharing
AT taraneheghlidos anefficientlatticebasedthresholdsignatureschemeusingmultistagesecretsharing
AT rahimtoluee anefficientlatticebasedthresholdsignatureschemeusingmultistagesecretsharing
AT hosseinpilaram efficientlatticebasedthresholdsignatureschemeusingmultistagesecretsharing
AT taraneheghlidos efficientlatticebasedthresholdsignatureschemeusingmultistagesecretsharing
AT rahimtoluee efficientlatticebasedthresholdsignatureschemeusingmultistagesecretsharing
_version_ 1721302877143564288