Cryptology ePrint Archive: Report 2000/031
Forward Security in Threshold Signature Schemes
Michel Abdalla and Sara Miner and Chanathip Namprempre
Abstract: We consider the usage of forward security with threshold
signature schemes. This means that even if more than the
threshold number of players are compromised, some security remains:
it is not possible to forge signatures relating to the past. In
this paper, we describe the first forward-secure threshold
signature schemes whose parameters (other than signing or verifying
time) do not vary in length with the number of time periods in the
scheme. Both are threshold versions of the Bellare-Miner
forward-secure signature scheme, which is Fiat-Shamir-based. One
scheme uses multiplicative secret sharing, and tolerates mobile
eavesdropping adversaries. The second scheme is based on polynomial
secret sharing, and we prove it forward-secure based on the security
of the Bellare-Miner scheme. We then sketch modifications which
would allow this scheme to tolerate malicious adversaries. Finally,
we give several general constructions which add forward security to
any existing threshold scheme.
Category / Keywords: cryptographic protocols / threshold cryptography, forward security,
Date: received 16 Jun 2000
Contact author: cnamprem at cs ucsd edu
Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Version: 20000616:205733 (All versions of this report)
Short URL: ia.cr/2000/031
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]