A Threshold Undeniable Signature Scheme Without a Trusted Party
نویسنده
چکیده
At Auscrpt’92, Harn and Yang first proposed the conception of (t, n) threshold undeniable signature, in which only subsets with at least t members can represent a group to generate, confirm or disavow a signature. Later, several schemes are proposed, but none of them is secure. So up to now, how to design a secure (t, n) threshold undeniable signature scheme is remained an open problem. In this paper, based on discrete logarithm cryptosystem, a secure and efficient (t, n) threshold undeniable signature scheme without a trusted party is presented. This scheme has an attractive property that member’s honesty is verifiable because a publicly verifiable secret sharing scheme is used to distribute secrets and two discrete logarithm equality protocols are used to provide necessary proofs of correctness, which are proposed by Schoenmakers at Crypto’99.
منابع مشابه
A Threshold Signature Scheme with a Weakened Trusted Party
In the (t, n) threshold signature schemes with the assistance of a trusted party, the trusted party easily becomes the targets of attack. And an authority which can be trusted by all players doesn't exist. So the schemes without a trusted party were proposed to solve those security problems. But all of the conventional schemes without a trusted party cannot withstand conspiracy attacks. A novel...
متن کاملUndeniable Mobile Billing Schemes
An undeniable mobile billing system allows a mobile network service provider to bill its subscribers with trustworthy evidences. Chen, Jan and Chen proposed such a billing system by introducing a trusted third party – Observer and exploiting a hash chain mechanism. In their system, the Observer provides call time evidence to both cellular carriers and subscribers for billing. In this paper, we ...
متن کاملA Note on a Convertible Undeniable Signature Scheme with Delegatable Verification
Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control the verifiability of his signatures. Convertible undeniable signatures, introduced by Boyar, Chaum, Damg̊ard, and Pedersen, furthermore allow the signer to convert signatures to publicly verifiable ones by publicizing a verifica...
متن کاملAn Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control the verifiability of his signatures. Convertible undeniable signatures, introduced by Boyar, Chaum, Damg̊ard, and Pedersen, furthermore allow the signer to convert signatures to publicly verifiable ones by publicizing a verifica...
متن کاملOn the Evidence based TTP Cluster Election in the P2P Network
In this paper we proposed an e-coin based role election scheme for peer-to-peer (P2P) systems. A node in a P2P group can be elected as an application server, or a trusted third party (TTP) server, but not both. The attributes of the election process and the outcomes are mapped to the Ferguson’s e-coin scheme so that undeniable evidences can be generated even when the P2P nodes remain anonymous....
متن کامل