Font Size: a A A

Threshold Signature Scheme Based On Secret Sharing And Its Application

Posted on:2023-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:N ZhangFull Text:PDF
GTID:2568306800966699Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The application range of threshold signature is more and more extensive.In view of the low efficiency of the existing threshold signature scheme based on bilinear pairing,this paper focuses on the following researches on the threshold signature scheme and the threshold ring signature scheme:(1)This paper proposes a traceable threshold signature scheme based on blockchain.This scheme is based on the Chinese remainder theorem and uses Asmuth-Bloom secret sharing without relying on a trusted center.The nodes cooperate to jointly generate the secret share,which ensures the correctness of the secret share and effectively solves the problems of authority fraud and single point of failure.Moreover,the scheme realizes the regular update of the private key,which can well resist mobile attacks.On this basis,in order to adapt to the large liquidity of the blockchain,the scheme realizes that the nodes of the blockchain can join and exit.In addition,this scheme realizes the traceability of malicious nodes and the anonymity of signature nodes,which has better security advantages.Compared with the existing scheme,the scheme does not use the bilinear pair operation with high complexity,therefore,the calculation complexity is low and the efficiency is high.(2)Combining threshold ring signature with certificateless public key cryptosystem,a certificateless threshold ring signature scheme is proposed,which solves the problems of certificate management,key escrow,authority fraud and single point of failure.The scheme does’ t use the bilinear pairing operation with large system overhead,which effectively improves the computational efficiency.In addition,this scheme uses the characteristics of threshold ring signature to ensure the anonymity of users,and under the random oracle model,it proves that the scheme is unforgeable.(3)This paper proposes a threshold signature-based blockchain electronic voting scheme without a trusted center.The scheme uses secret sharing,and the secret share generated by the interaction of nodes solves the security problems such as authority deception and single point of failure.Voters send signed ballots and additional messages to the voting center at the same time,and use the added value to detect whether the ballots are repeated,further improving the practicability and security of electronic voting.
Keywords/Search Tags:Threshold Signatures, Certificateless Public Keycryptography, Secret Sharing
PDF Full Text Request
Related items