Browse > Article
http://dx.doi.org/10.3837/tiis.2016.02.025

A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center  

Jie, Yan (Equipment Command and Management Department, Mechanical Engineering College)
Yu, Lu (Equipment Command and Management Department, Mechanical Engineering College)
Li-yun, Chen (Information Engineering Department, Mechanical Engineering College)
Wei, Nie (College of Information Engineering, Shenzhen University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.10, no.2, 2016 , pp. 897-913 More about this Journal
Abstract
Threshold signature is very important in identity authentication and some other applications. In December 2010, Chinese Encryption Administration released the SM2 elliptic curve digital signature algorithm as the first standard of the digital signature algorithm in China. At present, the papers on the threshold signature scheme based on this algorithm are few. A SM2 elliptic curve threshold signature scheme without a trusted center is proposed according to the Joint-Shamir-RSS algorithm, the Joint-Shamir-ZSS algorithm, the sum or diff-SS algorithm, the Mul-SS algorithm, the Inv-SS algorithm and the PM-SS algorithm. The proposed scheme is analyzed from correctness, security and efficiency. The correctness analysis shows that the proposed scheme can realize the effective threshold signature. The security analysis shows that the proposed scheme can resist some kinds of common attacks. The efficiency analysis shows that if the same secret sharing algorithms are used to design the threshold signature schemes, the SM2 elliptic curve threshold signature scheme will be more efficient than the threshold signature scheme based on ECDSA.
Keywords
Threshold signature; SM2 elliptic curve digital signature; secret sharing; without a trusted center;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Harn L, “Group-oriented (t,n) threshold digital signature scheme and digital multisignature,” IEE Proceedings-Computers and Digital Techniques, vol. 141, no. 5, pp. 307-313, September, 1994. Article (CrossRef Link).   DOI
2 BOYD C, "Digital multisignatures," in Proc. of Cryptography and Coding, pp. 241-246, December 17-21, 1986. Article (CrossRef Link).
3 Desmedt Y and Frankel Y, "Threshold cryptosystems," in Proc. of Advances in Cryptology, pp. 307-315, August 20-24, 1989. Article (CrossRef Link).
4 Desmedt Y and Frankel Y, "Shared generation of authenticators and signatures," in Proc. of Advances in Cryptology, pp. 457-469, August 11-15, 1991. Article (CrossRef Link).
5 Gennaro R, Jarecki S and Krawczyk H, "Robust threshold DSS signatures," in Proc. of Advances in Cryptology, pp. 354-371, May 12-16, 1996. Article (CrossRef Link).
6 Wang C T, Lin C H and Chang C C, “Threshold signature schemes with traceable signers in group communications,” Computer Communications, vol. 21, no. 8, pp. 771–776, June, 1998. Article (CrossRef Link).   DOI
7 Miyazaki K and Takaragi K, “A threshold digital signature scheme for a smart card based system,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 84, no. 1, pp. 205–213, January, 2001. Article (CrossRef Link).
8 Slim Bettaieb and Julien Schrek, "Improved lattice-based threshold ring signature scheme," Lecture Notes in Computer Science, vol. 7932, no. 1, pp. 34-51, June, 2013. Article (CrossRef Link).
9 HAN Jin-rong, LU Ji-qiang and WANG Xin- mei, “A verifiable threshold signature scheme based on the elliptic curve,” Journal of Xidian University, vol. 30, no. 1, pp. 26–28, February, 2003. Article (CrossRef Link).
10 Peng Hua-xi and Feng Deng-guo, “A forward secure threshold signature scheme from bilinear pairing,” Journal of Computer Research and Development, vol. 44, no. 4, pp. 574–580, April, 2007. Article (CrossRef Link).   DOI
11 SHEN Zhong-hua and YU Xiu-yuan, “Threshold signature scheme with threshold verification based on multivariate linear polynomial,” Journal of Shanghai Jiaotong University (Science), vol. 16, no. 5, pp. 551–556, October, 2011. Article (CrossRef Link).   DOI
12 Qingbin Wang, Shaozhen Chen and Aijun Ge, "A new lattice-based threshold attribute-based signature scheme," Lecture Notes in Computer Science, vol. 9065, no. 1, pp. 406-420, May, 2015. Article (CrossRef Link).
13 Fei Li, Wei Gao, Guilin Wang, Kefei Chen and Xueli Wang, “Efficient identity-based threshold signature scheme from bilinear pairings in standard model,” International Journal of Internet Protocol Technology, vol. 8, no. 2-3, pp. 107-115, January, 2014. Article (CrossRef Link).   DOI
14 Chinese Encryption Administration, "SM2 elliptic curve public key algorithms," December, 2010. Article (CrossRef Link).
15 Jung Yeon Hwang, Hyoung Joong Kim, Dong Hoon Lee and Boyeon Song, “An enhanced (t, n) threshold directed signature scheme,” Information Sciences, vol. 275, pp. 284-292, August, 2014. Article (CrossRef Link).   DOI
16 Raman Kumar, Harsh Kumar Verma and Renu Dhir, “Analysis and design of protocol for enhanced threshold proxy signature scheme based on RSA for known signers,” Wireless Personal Communications, vol. 80, no. 3, pp. 1281-1345, February, 2015. Article (CrossRef Link).   DOI