Glitter: A Fully Adaptive and Tightly Secure Threshold Signature

Shaolong Tang, Peng Jiang*, Liehuang Zhu

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

Threshold signatures (TS) have been widely used in digital wallets and blockchain ecosystems. In a (t, n) threshold signature scheme, at least t+1 signers are required to produce a valid signature. The state-of-the-art TS schemes compromise either the security model or incur at least linear-size reduction loss. Designing a fully adaptive and tightly secure TS scheme without algebraic group model (AGM) is still challenging. In this work, we propose a new security model, EUF-CMA-FC, making an enhancement in randomness guarantee and capturing fully adaptive security. We also propose Glitter, a fully adaptive and tightly secure five-round threshold signature scheme without pairing. Glitter has a comparable signature size and verification time with the state-of-the-art works. We prove the tight security of Glitter in the EUF-CMA-FC model in the random oracle model via security reduction. Without AGM, the security of Glitter can be reduced to t-algebraic translation resistance of tagged linear function (which implies DDH) with reduction loss L=2.

源语言英语
主期刊名Information Security and Privacy - 30th Australasian Conference, ACISP 2025, Proceedings
编辑Willy Susilo, Josef Pieprzyk
出版商Springer Science and Business Media Deutschland GmbH
184-204
页数21
ISBN(印刷版)9789819690947
DOI
出版状态已出版 - 2025
活动30th Australasian Conference on Information Security and Privacy, ACISP 2025 - Wollongong, 澳大利亚
期限: 14 7月 202516 7月 2025

出版系列

姓名Lecture Notes in Computer Science
15658 LNCS
ISSN(印刷版)0302-9743
ISSN(电子版)1611-3349

会议

会议30th Australasian Conference on Information Security and Privacy, ACISP 2025
国家/地区澳大利亚
Wollongong
时期14/07/2516/07/25

指纹

探究 'Glitter: A Fully Adaptive and Tightly Secure Threshold Signature' 的科研主题。它们共同构成独一无二的指纹。

引用此