Cryptology ePrint Archive: Report 2002/081

Some Applications of Threshold Signature Schemes to Distributed Protocols

Vanesa Daza and Javier Herranz and Germ\'an S\'aez

Abstract: In a threshold signature scheme, a group of players share a secret information in such a way that only those subsets with a minimum number of players can compute a valid signature. We propose methods to construct some useful and computationally secure distributed protocols from threshold signature schemes satisfying some suitable properties.

Namely, we prove that any threshold signature scheme which is non-interactive can be used to construct a metering scheme. We also design a distributed key distribution scheme from any deterministic threshold signature scheme. The security of these news schemes is reduced to the security of the corresponding threshold signature schemes. Furthermore, the constructed protocols reach some desirable properties.

Category / Keywords: cryptographic protocols / threshold signature schemes, metering schemes, distributed key distribution schemes.

Date: received 25 Jun 2002

Contact author: jherranz at mat upc es

Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation

Version: 20020625:173502 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]