Identity-Based Threshold Group Signature Scheme Based on Multiple Hard Number Theoretic Problems

Nedal Tahat, Ashraf A. tahat


We introduce in this paper a new identity-based threshold signature (IBTHS) technique, which is based on a pair of intractable problems, residuosity and discrete logarithm. This technique relies on two difficult problems and offers an improved level of security relative to an individual hard problem. The majority of the denoted IBTHS techniques are established on an individual difficult problem. Despite the fact that these methods are secure, however, a prospective solution of this sole problem by an adversary will enable him/her to recover the entire private data together with secret keys and configuration values of the associated scheme. Our technique is immune to the four most familiar attack types in relation to the signature schemes. Enhanced performance of our proposed technique is verified in terms of minimum cost of computations required by both of the signing algorithm and the verifying algorithm in addition to immunity to attacks.


Identity-based signature, threshold signature; residuosity and discrete logarithm.


W. Diffie, M. E. Hellman (1971). New direction in Cryptography, IEEE Transaction on Information Theory. 22:pp. 644-654.

Y. Desmedt (1987). Society and group oriented cryptography: a new concept, In Proc. A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, USA, 1987, pp. 120-127.

A .Boldyreva (2003). Efficient threshold signatures, multi- signatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme, In Proceedings of PKC 2003, Miami, USA, pp. 31-46.

Y. Desmedt (1994). Threshold cryptography, European Transactions on Telecommunications, 5 (4), pp.449–457.

P. A. Fouque (2001). J. Stern Fully distributed threshold RSA under standard assumptions, In Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, pp. 310-330.

R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin (2001). Robust threshold DSS signatures, Information and Computation, 164 (1), pp. 54–84.

V. Shoup (2000). Practical threshold signatures, In Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, pp.207-220.

J. Yu, F. Kong X, Cheng (2010). Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes. Journal of Networks, 5 (6), pp.634-641.

V. Shamir (1984). Identity-based cryptosystems and signature schemes, In Proceedings of Crypto 1984, Santa Barbara, USA, pp. 47-53.

M. Bellare, Namprempre. C and G. Neven (2004), Security proofs for identity based identification and signature schemes, In Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, pp. 268-286.

D. Boneh, M. Franklin (2001). Identity-Based encryption from the Weil pairing, In it Crypto 2001, Santa Barbara, USA, pp. 213-229.

F. Li, J. Yu (2007). A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem, Network and Parallel/Distributed Computing, SNPD 2007. Eighth ACIS International Conference on, (3), pp. 1176-1182.

Y. Yu, B. Yang, Y. Sun (2007). Identity-based threshold signature and mediated proxy signature schemes Journal of China Universities of Posts and Telecommunications, 14 (2), pp. 69–74.

Q. Huawang, Z. Xiaohua, D. Yuewei (2014). Provably secure Identity-based threshold signature on access structure. IET.

M. Mohamad, E. Ismail (2013). Threshold Signature with Hybrid Problems, International Journal of Cryptology Research, 4 (1), pp. 32 – 41.

E.S, Ismail, N.M.F. Tahat, and R.R Ahmad (2008). A New Digital Signature Scheme Based on Factoring and Discrete Logarithms, Journal of Mathematics and Statistics.

Total views : 19 times


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.