An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Abstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper s...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-01-01
|
Series: | IET Information Security |
Online Access: | https://doi.org/10.1049/ise2.12007 |
id |
doaj-ff2408c4edd74bef96cb2cb6a9fc034f |
---|---|
record_format |
Article |
spelling |
doaj-ff2408c4edd74bef96cb2cb6a9fc034f2021-07-14T13:25:19ZengWileyIET Information Security1751-87091751-87172021-01-011519810610.1049/ise2.12007An efficient lattice‐based threshold signature scheme using multi‐stage secret sharingHossein Pilaram0Taraneh Eghlidos1Rahim Toluee2Department of Electrical Engineering Sharif University of Technology Tehran IranElectronics Research Institute Sharif University of Technology Tehran IranDepartment of Electrical Engineering Sharif University of Technology Tehran IranAbstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper solutions. The authors address some important features like verifiability and being multi‐stage to make it usable in various field of application. Here, the authors propose an anonymous threshold signature scheme based on the trapdoor function introduced by Micciancio and Peikert by sharing the private key using a lattice‐based threshold multi‐stage secret sharing (TMSSS) scheme. Then, the authors improve the previously proposed TMSSS scheme, in such a way that less public values are required to publish on the bulletin board which makes the scheme more efficient while preserving the security of the scheme based on the lattice hard problems. The proposed scheme inherits the desired features such as anonymity and verifiability from the improved TMSSS scheme. Furthermore, both schemes use simple matrix operations, which additionally increase the efficiency.https://doi.org/10.1049/ise2.12007 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Hossein Pilaram Taraneh Eghlidos Rahim Toluee |
spellingShingle |
Hossein Pilaram Taraneh Eghlidos Rahim Toluee An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing IET Information Security |
author_facet |
Hossein Pilaram Taraneh Eghlidos Rahim Toluee |
author_sort |
Hossein Pilaram |
title |
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing |
title_short |
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing |
title_full |
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing |
title_fullStr |
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing |
title_full_unstemmed |
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing |
title_sort |
efficient lattice‐based threshold signature scheme using multi‐stage secret sharing |
publisher |
Wiley |
series |
IET Information Security |
issn |
1751-8709 1751-8717 |
publishDate |
2021-01-01 |
description |
Abstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper solutions. The authors address some important features like verifiability and being multi‐stage to make it usable in various field of application. Here, the authors propose an anonymous threshold signature scheme based on the trapdoor function introduced by Micciancio and Peikert by sharing the private key using a lattice‐based threshold multi‐stage secret sharing (TMSSS) scheme. Then, the authors improve the previously proposed TMSSS scheme, in such a way that less public values are required to publish on the bulletin board which makes the scheme more efficient while preserving the security of the scheme based on the lattice hard problems. The proposed scheme inherits the desired features such as anonymity and verifiability from the improved TMSSS scheme. Furthermore, both schemes use simple matrix operations, which additionally increase the efficiency. |
url |
https://doi.org/10.1049/ise2.12007 |
work_keys_str_mv |
AT hosseinpilaram anefficientlatticebasedthresholdsignatureschemeusingmultistagesecretsharing AT taraneheghlidos anefficientlatticebasedthresholdsignatureschemeusingmultistagesecretsharing AT rahimtoluee anefficientlatticebasedthresholdsignatureschemeusingmultistagesecretsharing AT hosseinpilaram efficientlatticebasedthresholdsignatureschemeusingmultistagesecretsharing AT taraneheghlidos efficientlatticebasedthresholdsignatureschemeusingmultistagesecretsharing AT rahimtoluee efficientlatticebasedthresholdsignatureschemeusingmultistagesecretsharing |
_version_ |
1721302877143564288 |