A Threshold Undeniable Signature Scheme Without a Trusted Party

نویسنده

  • QING Si-han
چکیده

At Auscrpt’92, Harn and Yang first proposed the conception of (t, n) threshold undeniable signature, in which only subsets with at least t members can represent a group to generate, confirm or disavow a signature. Later, several schemes are proposed, but none of them is secure. So up to now, how to design a secure (t, n) threshold undeniable signature scheme is remained an open problem. In this paper, based on discrete logarithm cryptosystem, a secure and efficient (t, n) threshold undeniable signature scheme without a trusted party is presented. This scheme has an attractive property that member’s honesty is verifiable because a publicly verifiable secret sharing scheme is used to distribute secrets and two discrete logarithm equality protocols are used to provide necessary proofs of correctness, which are proposed by Schoenmakers at Crypto’99.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Threshold Signature Scheme with a Weakened Trusted Party

In the (t, n) threshold signature schemes with the assistance of a trusted party, the trusted party easily becomes the targets of attack. And an authority which can be trusted by all players doesn't exist. So the schemes without a trusted party were proposed to solve those security problems. But all of the conventional schemes without a trusted party cannot withstand conspiracy attacks. A novel...

متن کامل

Undeniable Mobile Billing Schemes

An undeniable mobile billing system allows a mobile network service provider to bill its subscribers with trustworthy evidences. Chen, Jan and Chen proposed such a billing system by introducing a trusted third party – Observer and exploiting a hash chain mechanism. In their system, the Observer provides call time evidence to both cellular carriers and subscribers for billing. In this paper, we ...

متن کامل

A Note on a Convertible Undeniable Signature Scheme with Delegatable Verification

Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control the verifiability of his signatures. Convertible undeniable signatures, introduced by Boyar, Chaum, Damg̊ard, and Pedersen, furthermore allow the signer to convert signatures to publicly verifiable ones by publicizing a verifica...

متن کامل

An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification

Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control the verifiability of his signatures. Convertible undeniable signatures, introduced by Boyar, Chaum, Damg̊ard, and Pedersen, furthermore allow the signer to convert signatures to publicly verifiable ones by publicizing a verifica...

متن کامل

On the Evidence based TTP Cluster Election in the P2P Network

In this paper we proposed an e-coin based role election scheme for peer-to-peer (P2P) systems. A node in a P2P group can be elected as an application server, or a trusted third party (TTP) server, but not both. The attributes of the election process and the outcomes are mapped to the Ferguson’s e-coin scheme so that undeniable evidences can be generated even when the P2P nodes remain anonymous....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001