Threshold undeniable signature scheme based on conic

被引:8
|
作者
Lu, RX [1 ]
Cao, ZF [1 ]
Zhou, Y [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, Shanghai 200030, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
undeniable signature; threshold signature; conic;
D O I
10.1016/j.amc.2003.12.084
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Recently, undeniable signature has received a significant attention and has been extensively researched in the cryptographic community. Many undeniable schemes have been proposed. However, most of previous proposed schemes are based on discrete logarithm cryptosystems. In this paper, we present conic analogy of the first undeniable RSA signature scheme proposed by Gennaro, Krawczyk and Rabin at Crypto'97, and propose the first threshold undeniable signature scheme based on conic. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:165 / 177
页数:13
相关论文
共 50 条
  • [1] Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    Yousef, Sufian
    Cole, Mike
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153
  • [2] Secure Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 63 - 68
  • [3] An Undetachable Threshold Digital Signature Scheme Based on Conic Curves
    Shi, Yang
    Xiong, Guoyue
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (02): : 823 - 828
  • [4] Undeniable (t, n)-threshold signature scheme with cheater identification
    Lin, TY
    Wu, TC
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 1998, 21 (06) : 775 - 780
  • [5] Lattice-based undeniable signature scheme
    Rawal, Swati
    Padhye, Sahadeo
    He, Debiao
    [J]. ANNALS OF TELECOMMUNICATIONS, 2022, 77 (3-4) : 119 - 126
  • [6] Lattice-based undeniable signature scheme
    Swati Rawal
    Sahadeo Padhye
    Debiao He
    [J]. Annals of Telecommunications, 2022, 77 : 119 - 126
  • [7] Threshold entrusted undeniable signature
    Kim, S
    Won, D
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 : 195 - 203
  • [8] An electronic voting scheme based on undeniable blind signature scheme
    Yun, SH
    Lee, SJ
    [J]. 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 163 - 167
  • [9] Convertible undeniable signature scheme
    Yun, SH
    Kim, TY
    [J]. HIGH PERFORMANCE COMPUTING ON THE INFORMATION SUPERHIGHWAY - HPC ASIA '97, PROCEEDINGS, 1997, : 700 - 703
  • [10] Certificateless undeniable signature scheme
    Duan, Shanshan
    [J]. INFORMATION SCIENCES, 2008, 178 (03) : 742 - 755