@inproceedings{e2890ccd048f43ba920d92208c213844,
title = "Glitter: A Fully Adaptive and Tightly Secure Threshold Signature",
abstract = "Threshold signatures (TS) have been widely used in digital wallets and blockchain ecosystems. In a (t, n) threshold signature scheme, at least t+1 signers are required to produce a valid signature. The state-of-the-art TS schemes compromise either the security model or incur at least linear-size reduction loss. Designing a fully adaptive and tightly secure TS scheme without algebraic group model (AGM) is still challenging. In this work, we propose a new security model, EUF-CMA-FC, making an enhancement in randomness guarantee and capturing fully adaptive security. We also propose Glitter, a fully adaptive and tightly secure five-round threshold signature scheme without pairing. Glitter has a comparable signature size and verification time with the state-of-the-art works. We prove the tight security of Glitter in the EUF-CMA-FC model in the random oracle model via security reduction. Without AGM, the security of Glitter can be reduced to t-algebraic translation resistance of tagged linear function (which implies DDH) with reduction loss L=2.",
keywords = "Fully Adaptive, Threshold Signature, Tight Reduction",
author = "Shaolong Tang and Peng Jiang and Liehuang Zhu",
note = "Publisher Copyright: {\textcopyright} The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.; 30th Australasian Conference on Information Security and Privacy, ACISP 2025 ; Conference date: 14-07-2025 Through 16-07-2025",
year = "2025",
doi = "10.1007/978-981-96-9095-4\_10",
language = "English",
isbn = "9789819690947",
series = "Lecture Notes in Computer Science",
publisher = "Springer Science and Business Media Deutschland GmbH",
pages = "184--204",
editor = "Willy Susilo and Josef Pieprzyk",
booktitle = "Information Security and Privacy - 30th Australasian Conference, ACISP 2025, Proceedings",
address = "Germany",
}