Sciweavers

ASIACRYPT
2001
Springer

Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes

14 years 5 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in designing these protocols is to base them upon existing single-server systems having the desired properties. Two recent (single-server) signature schemes, one due to Gennaro et al., the other to Cramer and Shoup, have been developed which are provably secure using only standard number-theoretic hardness assumptions. Catalano et al. proposed a statically secure threshold implementation of these schemes. We improve their protocol to make it secure against an adaptive adversary, thus providing a threshold signature scheme with stronger security properties than any previously known. As a tool, we also develop an adaptively secure, erasure-free threshold version of the Paillier cryptosystem.
Anna Lysyanskaya, Chris Peikert
Added 28 Jul 2010
Updated 28 Jul 2010
Type Conference
Year 2001
Where ASIACRYPT
Authors Anna Lysyanskaya, Chris Peikert
Comments (0)