1-out-of-n Signatures from a Variety of Keys
نویسندگان
چکیده
This paper addresses how to use public-keys of several different signature schemes to generate 1-out-of-n signatures. Previously known constructions are for either RSA-keys only or DL-type keys only. We present a widely applicable method to construct a 1-out-of-n signature scheme that allows mixture use of different flavors of keys at the same time. The resulting scheme is more efficient than previous schemes even if it is used only with a single type of keys. With all DL-type keys, it yields shorter signatures than the ones of the previously known scheme based on the witness indistinguishable proofs by Cramer, et. al. With all RSA-type keys, it reduces both computational and storage costs compared to that of the Ring signatures by Rivest, et. al.
منابع مشابه
Parametrization of Pedestrian Injuries and its Utilisation in Proving Traffic Accidents Course Using Injury Signatures and Contact Signatures
Background: The paper points out the present limited possibility of using the verbal description of injuries for the needs of experts from the field of road transportation as relevant criminalistics traces, as well as the options of the FORTIS system that creates a new area for a deeper interdisciplinary approach in the field of expert evidence. Further a description of how to create injury si...
متن کاملIdentification of Ascidians (Tunicata: Ascidiacea) around Larak Island in the Persian Gulf
Despite the variety of marine organisms recorded from the Persian Gulf, acidians located along the Persian Gulf have not received much attention. We collected Ascidian samples from four sites along Larak Island (Persian Gulf) using Scuba diving and snorkeling at a depth that ranged from 5-15 m. Taxonomic identification was carried out by authoritative keys and texts. We found 4 species that be...
متن کاملA Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys
In 2004, Abe et al. proposed a threshold signer-ambiguous signature scheme from variety of keys. Their scheme is a generalized case of the ring signature scheme, and it allows the key types to be based on the trapdoor one-way permutations (TOWP) or sigma-protocols including Schnorr’s signature scheme. However, the signed message is public for all, which may result in disputes. In this paper, we...
متن کاملImprovement of Threshold Signature Using Self-certified Public Keys
A (t, n) threshold signature scheme allows any t or more signers to cooperatively sign messages on behalf of a group, but t − 1 or fewer signers cannot. Wu and Hsu recently proposed a new (t, n) threshold signature scheme using self-certified public keys. In their scheme, the authentication of the self-certified individual/group public keys can be confirmed simultaneously in the procedure of ve...
متن کاملComparison Analysis of Particulate Matters in a Micro Environment
Different approaches of source apportionment of dust fractions have been reported world-over. Predicting source categories within receptor chemical profiles using regression and factor analysis using PCA has been reported to evaluate possible source/routes of air pollution mass. The present study is focused on the application of all three approaches to investigate higher degrees of significance...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEICE Transactions
دوره 87-A شماره
صفحات -
تاریخ انتشار 2002