Title
Secure Computation of Shared Secrets and Its Applications
Abstract
There has been renewed attention to threshold signature in recent years as the threshold version of the ECDSA and SM2 Elliptic Curve Cryptographic Algorithm (SM2) could be used in Bitcoin as an underlying digital signature scheme to protect users' private keys that guarantees transactions. A (t, n) threshold signature scheme means in a set of n parties, at least t players can exercise the right of generating signatures on behalf of the group, and any less than t of the players' cooperation cannot generate a valid signature for the message nor obtain any information about the shared secret key. Thus, it is meaningful to construct a purely (t, n) threshold SM2 signature scheme (purely (t, n) means in the whole signature scheme, the threshold value is fixed to t). We propose a robust multiplication protocol of shared secrets to resolve the "multiplication of shared secrets" problem in existing threshold signature schemes. Using the proposed multiplication protocol, we improve the existing secret reciprocal computation protocol and show how to get a purely (t, n) threshold SM2 signature scheme.
Year
DOI
Venue
2021
10.1007/978-3-030-89432-0_10
INFORMATION SECURITY APPLICATIONS
Keywords
DocType
Volume
Threshold signature, SM2, Secure computation of shared secrets
Conference
13009
ISSN
Citations 
PageRank 
0302-9743
0
0.34
References 
Authors
0
3
Name
Order
Citations
PageRank
Xin Liu100.34
Willy Susilo24823353.18
Joonsang Baek379452.88