You are looking at a specific version 20020625:173502 of this paper. See the latest version.

Paper 2002/081

Some Applications of Threshold Signature Schemes to Distributed Protocols

Vanesa Daza and Javier Herranz and Germán Sáez

Abstract

In a threshold signature scheme, a group of players share a secret information in such a way that only those subsets with a minimum number of players can compute a valid signature. We propose methods to construct some useful and computationally secure distributed protocols from threshold signature schemes satisfying some suitable properties. Namely, we prove that any threshold signature scheme which is non-interactive can be used to construct a metering scheme. We also design a distributed key distribution scheme from any deterministic threshold signature scheme. The security of these news schemes is reduced to the security of the corresponding threshold signature schemes. Furthermore, the constructed protocols reach some desirable properties.

Metadata
Available format(s)
PDF PS
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
threshold signature schemesmetering schemesdistributed key distribution schemes.
Contact author(s)
jherranz @ mat upc es
History
2002-06-25: received
Short URL
https://ia.cr/2002/081
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.