Namely, we prove that any threshold signature scheme which is non-interactive can be used to construct a metering scheme. We also design a distributed key distribution scheme from any deterministic threshold signature scheme. The security of these news schemes is reduced to the security of the corresponding threshold signature schemes. Furthermore, the constructed protocols reach some desirable properties.
Category / Keywords: cryptographic protocols / threshold signature schemes, metering schemes, distributed key distribution schemes. Date: received 25 Jun 2002 Contact author: jherranz at mat upc es Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20020625:173502 (All versions of this report) Short URL: ia.cr/2002/081