An enhanced (t,n) threshold directed signature scheme

被引:7
|
作者
Hwang, Jung Yeon [1 ]
Kim, Hyoung Joong [2 ]
Lee, Dong Hoon [2 ]
Song, Boyeon [3 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305700, South Korea
[2] Korea Univ, Grad Sch Informat Secur, Seoul 136701, South Korea
[3] Korea Inst Sci & Technol Informat, Taejon 305806, South Korea
基金
新加坡国家研究基金会;
关键词
Directed signature; Threshold; Designated verifier; Rogue-key attack; Forgery; SCALABLE PROTOCOLS; MULTISIGNATURES;
D O I
10.1016/j.ins.2014.02.038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A directed signature scheme is devised to achieve directivity for verification such that only a designated verifier can check the validity of a signature and, in times of trouble, any third party can verify the signature with the help of the signer or the designated verifier. A threshold directed signature scheme distributes responsibility and authority for generating a directed signature to several users via a threshold mechanism. Lu et al. recently proposed a novel (t, n) threshold directed signature scheme. In this paper, we show that the scheme is vulnerable to a rogue-key attack which is mounted by an adversary who can arbitrarily select his or her public key. Through the rogue-key attack, the adversary can forge a signature on any message for a set of signers. In order to thwart such a rogue-key attack, we propose an enhanced (t, n) threshold directed signature scheme with a reliable key registration protocol. The protocol guarantees that a user should have access to the secret key corresponding to the user's public key. Under the computational Diffie-Hellman assumption, we prove that the improved scheme is secure, that is, it achieves existential unforgeability under the chosen message attack, invisibility, and transitivity in the registered key model. We stress that the security of our improved scheme does not depend on a specific broadcast channel for synchronous message transmission. (C) 2014 Elsevier Inc. All rights reserved.
引用
下载
收藏
页码:284 / 292
页数:9
相关论文
共 50 条
  • [41] Secure(t,n) shared signature scheme
    2000, Sci Publ House (22):
  • [42] Cryptoanalyzing and Improving for Directed Signature Scheme and The Proxy Signature Scheme
    Hu, Xiaoming
    Jiang, Wenrong
    Ma, Chuang
    Yu, Chengcheng
    2018 11TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI 2018), 2018,
  • [43] Directed transitive signature scheme
    Yi, Xun
    TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 129 - 144
  • [44] Certificateless Directed Signature Scheme
    Wan, Zhongmei
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [45] Security Analysis of the Quantum (t, m, n) Threshold Group Blind Signature Scheme and its Improvement
    Jia-Hao Zhang
    Nian Xue
    Hao Wang
    Tao Zhang
    Xin Huang
    Jin-Xian Li
    Lei Du
    International Journal of Theoretical Physics, 64 (1)
  • [46] Improved quantum(t,n) threshold group signature
    张耀东
    刘锋
    左海新
    Chinese Physics B, 2023, (09) : 219 - 226
  • [47] An Efficient Threshold Signature Scheme
    Zhang Chengli
    Tang Chunming
    2011 SECOND ETP/IITA CONFERENCE ON TELECOMMUNICATION AND INFORMATION (TEIN 2011), VOL 1, 2011, : 85 - 87
  • [48] An RSA-based (t, n) threshold proxy signature scheme without any trusted combiner
    Ting, Pei-yih
    Huang, Xiao-Wei
    INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 277 - 284
  • [49] An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers
    Kumar, Raman
    Verma, Harsh Kumar
    2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 293 - 298
  • [50] (t, n) Threshold digital signature with traceability property
    Lee, WB
    Chang, CC
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (05) : 669 - 678