TY - JOUR
T1 - Theory and Applications of Sequentially Threshold Public-Key Cryptography
T2 - Practical Private Key Safeguarding and Secure Use for Individual Users
AU - Zhang, Jie
AU - Zhang, Futai
AU - Huang, Xinyi
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2025/3/17
Y1 - 2025/3/17
N2 - Motivated by the needs of power distribution as well as private key protection, the theory and implementation techniques of threshold public-key cryptography (PKC) have been being developed for a long time. However, researches in this field mainly focus on the needs and constraints in distributed environments which consist of nodes with computing capabilities and connected via peer-to-peer and broadcasting communication channels. The resulting schemes are theoretically helpful for private key security but inconvenient for individual users as their implementation requires distributed computing and networking system with broadcasting channels. To address the private key security issue of PKC schemes for individual users, this paper proposes the concept and general construction of sequentially threshold PKC under a communication model consisting of a computing device and several offline storages where broadcasting channels are not required. To illustrate the new paradigm, we design and realize a sequentially threshold Schnorr signature scheme STSS. The security proofs for STSS indicate its effectiveness of achieving unforeability under traditional attacks as well as security incidents caused by human faults and system failures. The experiments on FIPS recommended curves P-256, P-384, and P-521 show that STSS is comparable with the original Schnorr scheme in terms of time consumed for generating a signature. The construction of sequentially threshold ElGamal decrtyption scheme is also presented. Finally, we illustrate the application of STSS in the Blockchain ecosystem.
AB - Motivated by the needs of power distribution as well as private key protection, the theory and implementation techniques of threshold public-key cryptography (PKC) have been being developed for a long time. However, researches in this field mainly focus on the needs and constraints in distributed environments which consist of nodes with computing capabilities and connected via peer-to-peer and broadcasting communication channels. The resulting schemes are theoretically helpful for private key security but inconvenient for individual users as their implementation requires distributed computing and networking system with broadcasting channels. To address the private key security issue of PKC schemes for individual users, this paper proposes the concept and general construction of sequentially threshold PKC under a communication model consisting of a computing device and several offline storages where broadcasting channels are not required. To illustrate the new paradigm, we design and realize a sequentially threshold Schnorr signature scheme STSS. The security proofs for STSS indicate its effectiveness of achieving unforeability under traditional attacks as well as security incidents caused by human faults and system failures. The experiments on FIPS recommended curves P-256, P-384, and P-521 show that STSS is comparable with the original Schnorr scheme in terms of time consumed for generating a signature. The construction of sequentially threshold ElGamal decrtyption scheme is also presented. Finally, we illustrate the application of STSS in the Blockchain ecosystem.
KW - blockchain
KW - Key management
KW - private key security
KW - proactive secret sharing
KW - sequentially threshold cryptography
KW - threshold cryptography
UR - http://www.scopus.com/inward/record.url?scp=105001571743&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2025.3552202
DO - 10.1109/TIFS.2025.3552202
M3 - Article
AN - SCOPUS:105001571743
SN - 1556-6013
VL - 20
SP - 3220
EP - 3233
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
ER -