@inproceedings{593aafbd00c946a5b5c12fab7c5726c6,
title = "A new approach to robust threshold RSA signature schemes",
abstract = "In a threshold RSA signature scheme, dishonest participants can disrupt signature generation by submitting junk instead of their partial signatures. A threshold signature system is robust if it allows generation of correct signatures for a group of t honest participants, and in the presence of malicious participants. The purpose of this paper is two-fold. First we show that a robust (t, n) threshold RSA signature scheme, proposed by Rabin in Crypto'98, lacks an essential property of (t, n) threshold schemes and allows an adversary to forge signatures. Then we propose a new approach to the construction of t-robust (t, n) threshold RSA signature scheme which can be seen as the dual to Rabin's approach. We discuss the efficiency of our system and show that when t is small (compared to n) our scheme is much more efficient than other existing schemes.",
author = "Rei Safavi-Naini and Huaxiong Wang and Lam, {Kwok Yan}",
year = "2000",
doi = "10.1007/10719994_15",
language = "English",
isbn = "3540673806",
volume = "1787",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "184--196",
booktitle = "Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings",
address = "United States",
note = "2nd International Conference on Information Security and Cryptology, ICISC 1999 ; Conference date: 09-12-1999 Through 10-12-1999",
}