Skip to main content
placeholder image

Secure Computation of Shared Secrets and Its Applications

Chapter


Abstract


  • There has been renewed attention to threshold signature in recent years as the threshold version of the ECDSA and SM2 Elliptic Curve Cryptographic Algorithm (SM2) could be used in Bitcoin as an underlying digital signature scheme to protect users’ private keys that guarantees transactions. A (t, n) threshold signature scheme means in a set of n parties, at least t players can exercise the right of generating signatures on behalf of the group, and any less than t of the players’ cooperation cannot generate a valid signature for the message nor obtain any information about the shared secret key. Thus, it is meaningful to construct a purely (t, n) threshold SM2 signature scheme (purely (t, n) means in the whole signature scheme, the threshold value is fixed to t). We propose a robust multiplication protocol of shared secrets to resolve the “multiplication of shared secrets” problem in existing threshold signature schemes. Using the proposed multiplication protocol, we improve the existing secret reciprocal computation protocol and show how to get a purely (t, n) threshold SM2 signature scheme.

Publication Date


  • 2021

Citation


  • Liu, X., Susilo, W., & Baek, J. (2021). Secure Computation of Shared Secrets and Its Applications. In Unknown Book (Vol. 13009 LNCS, pp. 119-131). doi:10.1007/978-3-030-89432-0_10

International Standard Book Number (isbn) 13


  • 9783030894313

Scopus Eid


  • 2-s2.0-85118991648

Book Title


  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Start Page


  • 119

End Page


  • 131

Abstract


  • There has been renewed attention to threshold signature in recent years as the threshold version of the ECDSA and SM2 Elliptic Curve Cryptographic Algorithm (SM2) could be used in Bitcoin as an underlying digital signature scheme to protect users’ private keys that guarantees transactions. A (t, n) threshold signature scheme means in a set of n parties, at least t players can exercise the right of generating signatures on behalf of the group, and any less than t of the players’ cooperation cannot generate a valid signature for the message nor obtain any information about the shared secret key. Thus, it is meaningful to construct a purely (t, n) threshold SM2 signature scheme (purely (t, n) means in the whole signature scheme, the threshold value is fixed to t). We propose a robust multiplication protocol of shared secrets to resolve the “multiplication of shared secrets” problem in existing threshold signature schemes. Using the proposed multiplication protocol, we improve the existing secret reciprocal computation protocol and show how to get a purely (t, n) threshold SM2 signature scheme.

Publication Date


  • 2021

Citation


  • Liu, X., Susilo, W., & Baek, J. (2021). Secure Computation of Shared Secrets and Its Applications. In Unknown Book (Vol. 13009 LNCS, pp. 119-131). doi:10.1007/978-3-030-89432-0_10

International Standard Book Number (isbn) 13


  • 9783030894313

Scopus Eid


  • 2-s2.0-85118991648

Book Title


  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Start Page


  • 119

End Page


  • 131