Skip to main content
placeholder image

Fail-stop threshold signature schemes based on elliptic curves

Chapter


Abstract


  • Fail-stop signatures provide security for a sender against a forger with unlimited computational power. In this paper we present a fail-stop signature scheme based on discrete logarithm problem for elliptic curves and then show that the signing process can be distributed among a group of senders to obtain a threshold signature scheme. The threshold signature scheme has a cheater detection property and allows the combiner to detect a sender who is submitting false shares. We will show that our fail-stop signature scheme works in the two commonly used models of signature schemes, with or without a trusted authority.

Publication Date


  • 1999

Citation


  • Susilo, W., Safavi-Naini, R., & Pieprzyk, J. (1999). Fail-stop threshold signature schemes based on elliptic curves. In Unknown Book (Vol. 1587, pp. 103-116). doi:10.1007/3-540-48970-3_9

International Standard Book Number (isbn) 13


  • 9783540657569

Scopus Eid


  • 2-s2.0-84944181620

Book Title


  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Start Page


  • 103

End Page


  • 116

Abstract


  • Fail-stop signatures provide security for a sender against a forger with unlimited computational power. In this paper we present a fail-stop signature scheme based on discrete logarithm problem for elliptic curves and then show that the signing process can be distributed among a group of senders to obtain a threshold signature scheme. The threshold signature scheme has a cheater detection property and allows the combiner to detect a sender who is submitting false shares. We will show that our fail-stop signature scheme works in the two commonly used models of signature schemes, with or without a trusted authority.

Publication Date


  • 1999

Citation


  • Susilo, W., Safavi-Naini, R., & Pieprzyk, J. (1999). Fail-stop threshold signature schemes based on elliptic curves. In Unknown Book (Vol. 1587, pp. 103-116). doi:10.1007/3-540-48970-3_9

International Standard Book Number (isbn) 13


  • 9783540657569

Scopus Eid


  • 2-s2.0-84944181620

Book Title


  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Start Page


  • 103

End Page


  • 116