Traitor Traceable Signature Scheme

نویسندگان

  • Yuji Watanabe
  • Yuliang Zheng
  • Hideki Imai
چکیده

The new signature scheme, t ra i tor traceable signature scheme is presented, which allows the signer to convince any arbiter of the recipient's infringement, if the recipient distributes illegally the signature which he got. We use the techniques of a proof of knowledge of discrete logarithm[l][2], identification of double spender in an off-line electronic cash[3][4], and a signcryption scheme[5]. Our scheme consists of 3-move and it is more compact and efficient compared with the previous scheme[6], due to eliminate the cumbersome cut-and-choose like techniques. Moreover, our accusation protocol does not require the private-key of the recipient of signature, i.e., signer can convince any arbiter of the recipient's infringement without help of original recipient:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extracting Group Signatures from Traitor Tracing Schemes

To appear in Advances in Cryptology — Eurocrypt 2003, May 4-8, Warsaw, Poland, Eli Biham (Ed.), Springer LNCS, 2003 Digital Signatures emerge naturally from Public-Key Encryption based on trapdoor permutations, and the “duality” of the two primitives was noted as early as Diffie-Hellman’s seminal work. The present work is centered around the crucial observation that two well known cryptographic...

متن کامل

Group-Oriented Encryption and Signature

Computer networks bring tremendous progress to the information-based society. Companies, organizations, and governments have been using computers and networks to process or transmit digital data. But this also results in many different types of security requirements for group-oriented cryptographic applications. In this thesis we study existing cryptographic tools and then use them to design mo...

متن کامل

A traceable optimistic fair exchange protocol in the standard model

An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when a...

متن کامل

Short Traceable Signatures Based on Bilinear Pairings

We propose a short traceable signature scheme based on bilinear pairings. Traceable signatures, introduced by Kiayias, Tsiounis and Yung (KTY), support an extended set of fairness mechanisms (mechanisms for anonymity management and revocation) when compared with the traditional group signatures. Designing short signatures based on the power of pairing has been a current activity of cryptographi...

متن کامل

Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe

In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user’s decryption key is associated with attributes which in general are not related to the user’s identity, and the same set of attributes could be shared between multiple users. From the decryption key, if the user created a decryption blackbox for sale, this malicious user could be difficult to identify from the blackbox. Hence in p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004