On the value of threshold signatures

Chris J. Mitchell, Borselius, N. and Wilson, A.

(2002)

Chris J. Mitchell, Borselius, N. and Wilson, A. (2002) On the value of threshold signatures. ACM SIGOPS Operating Systems Review, 36 (4).

Our Full Text Deposits

Full text access: Open

Full Text - 210.3 KB

Full Text - 117.21 KB

Links to Copies of this Item Held Elsewhere


Abstract

Threshold signature schemes are examples of threshold cryptosystems, as introduced by Desmedt, [4]. The purpose of this paper is to present a rather simple alternative to threshold signatures which raises questions about the value of such schemes, at least when applied to the mobile agent scenario.

Information about this Version

This is a Published version
This version's date is: 10/2002
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/0a2cff14-4d1f-a81c-976c-1b66bb740cd8/1/

Item TypeJournal Article
TitleOn the value of threshold signatures
AuthorsMitchell, Chris
Borselius, N.
Wilson, A.
Uncontrolled Keywordsmobile agent, digital signature, threshold signature, security
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1145/583800.583804

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010

Notes

This is the final draft version of the paper that appeared in the journal 'ACM SIGOPS Operating Systems Review', 36(4), 2002.

References

1 Niklas Borselius , Chris J. Mitchell , Aaron Wilson, On Mobile Agent Based Transactions in Moderately Hostile Environments, Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security, p.173-186, November 26-27, 2001
2 Niklas Borselius , Chris J. Mitchell , Aaron Wilson, A pragmatic alternative to undetachable signatures, ACM SIGOPS Operating Systems Review, v.36 n.2, p.6-11, April 2002 [doi>10.1145/509526.509529]
3 Bruno Crispo, Delegation of Responsibility (Position Paper), Proceedings of the 6th International Workshop on Security Protocols, p.118-124, April 15-17, 1998
4 Yvo Desmedt, Society and Group Oriented Cryptography: A New Concept, A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, p.120-127, August 16-20, 1987
5 V. Shoup. Practical threshold signatures. In B. Preneel, editor, Advances in Cryptology --- EUROCRYPT 2000, number 1807 in Lecture Notes in Computer Science, pages 207-220. Springer-Verlag, Berlin, 2000.
6 V. Varadharajan, P. Allen, and S. Black. An analysis of the proxy problem in distributed systems. In Proceedings: 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pages 255-275. IEEE Computer Society Press, Los Alamitos, California, May 1991.


Details