New (t, n) threshold directed signature scheme with provable security

نویسندگان

  • Rongxing Lu
  • Xiaodong Lin
  • Zhenfu Cao
  • Jun Shao
  • Xiaohui Liang
چکیده

Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can verify the signature with the help of the signer or the designated verifier as well. Due to its merits, directed signature scheme is widely used in situations where the receiver’s privacy should be protected. Threshold directed signature is an extension of the standard directed signature, in which several signers may be required to cooperatively sign messages for sharing the responsibility and authority. To the best of our knowledge, threshold directed signature has not been well studied till now. Therefore, in this paper, we would like to formalize the threshold directed signature and its security model, then present a new (t,n) threshold directed signature scheme from bilinear pairings and use the techniques from provable security to analyze its security. 2007 Elsevier Inc. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Designated Verifier Threshold Proxy Signature Scheme without Random Oracles

In a (t, n) designated verifier threshold proxy signature scheme, an original signer can delegate his/her signing power to n proxy signers such that any t or more out of n proxy signers can sign messages on behalf of the original signer but t− 1 or less of the proxy signers cannot generate a valid proxy signature. Of course, the signature is issued for a designated receiver and therefore only t...

متن کامل

A Directed Signature Scheme Based on RSA Assumption

A directed signature scheme allows a designated verifier to directly verify a signature issued to him, and a third party to check the signature validity with the help of the signer or the designated verifier as well. Due to its merits, the directed signature scheme can be applied on some personally or commercially sensitive occasions. Up to now, there are several directed signature schemes havi...

متن کامل

An Efficient (n − t)-out-of-n Threshold Ring Signature Scheme

In this paper, we propose an efficient (n − t)-out-of-n threshold ring signature scheme which is efficient when t is small compared with n. Our scheme has a kind of dual structure of the Bresson– Stern–Szydlo threshold ring signature scheme [2], which is infeasible when t is small compared with n. In particular, we modify the trap-door one-way permutations in the ring signature scheme, and use ...

متن کامل

Threshold Ring Signatures in the Random Oracle Model

We improve on the Bresson–Stern–Szydlo threshold ring signature scheme which uses Shamir secret sharing scheme [6] by showing that the security can be proved under a strictly weaker assumption, that is the random oracle model rather than the ideal cipher model. Then we propose an efficient (n− t)-out-of-n threshold ring signature scheme which is efficient when t is small compared with n. Our sc...

متن کامل

Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems

Abstarct. Inspired by the recent developments in attribute-based encryption, in this paper we propose threshold attribute-based signatures (t-ABS). In a t-ABS, signers are associated with a set of attributes and verification of a signed document against a verification attribute set succeeds if the signer has a threshold number of (at least t) attributes in common with the verification attribute...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Sci.

دوره 178  شماره 

صفحات  -

تاریخ انتشار 2008