Journal on Communications ›› 2020, Vol. 41 ›› Issue (6): 61-69.doi: 10.11959/j.issn.1000-436x.2020129

• Papers • Previous Articles     Next Articles

Secure obfuscation for encrypted threshold signatures

Yahong LI1,Caifen WANG2,3,Yulei ZHANG2,Xiaodong YANG2,Haiyan HUANG1   

  1. 1 College of Telecommunication Engineering,Lanzhou Jiaotong University,Lanzhou 730070,China
    2 College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China
    3 College of Big Data and Internet,Shenzhen Technology University,Shenzhen 518118,China
  • Revised:2020-04-02 Online:2020-06-25 Published:2020-07-04
  • Supported by:
    The National Natural Science Foundation of China(61063041);The National Natural Science Foundation of China(61901201);The Youth Science Foundation of Lanzhou Jiaotong University(2018002)

Abstract:

Aiming at the key leakage security problem of the threshold signature,an encrypted threshold signature functionality was firstly proposed and securely obfuscated.The output of obfuscated circuit could be implemented by any third party without revealing the private key of threshold signature.Secondly,the security models of encrypted threshold signature functionality and the obfuscator were defined,such as the existential unforgeablity and the average case virtual black box property,and its correctness and security were proved.The analyses of theory and simulation experiment show that the obfuscation for encrypted threshold signature has feasibility.

Key words: obfuscation, encrypted threshold signature, encrypted private key, average case virtual black box property

CLC Number: 

No Suggested Reading articles found!