Threshold verification scheme to a valid-signature using identity only on specialized approval

作者:

Highlights:

摘要

This paper presents a proclaimed valid-signature verification scheme for a specialized group. The shared verification of such a signature makes use of the principle of threshold schemes and ID-based signatures. Our protocol enables any k out of the m verifiers (k⩽m) to validate the legality of a proclaimed valid-signature by using only the identities of participants. The significant feature in our scheme is the management of public keys removed. Instead, the verifiers' identities are required only in a network system. Furthermore, the partial results, instead of shadows associated with the verifiers, are used to avoid the frequent updating shadows in each verification process. In such a way, all the verifiers who are specialists in some knowledge are able to perform their duty to validate the proclaimed valid-signature at their convenience during the service time without changing their own secret shadows often.

论文关键词:ID-based signature,Security,Threshold scheme,Secret sharing

论文评审过程:Available online 28 June 2003.

论文官网地址:https://doi.org/10.1016/S0096-3003(03)00563-0