Threshold entrusted undeniable signature

Seungjoo Kim, Dongho Won

Research output: Contribution to journalConference articlepeer-review

2 Citations (Scopus)


Entrusted undeniable signatures are like undeniable signatures, except that the disavowal protocol can only be run by a court in order to resolve a formal dispute. This paper introduces threshold entrusted undeniable signature scheme without trusted center. It is shown how the power to run a disavowal protocol of entrusted undeniable signature can be distributed to n agents such that any t of these can verify a signature. This facility is useful to solve "lie detector" problem of undeniable signatures.

Original languageEnglish
Pages (from-to)195-203
Number of pages9
JournalLecture Notes in Computer Science
Publication statusPublished - 2005
Externally publishedYes
Event7th International Conference on Information Security and Cryptology - ICISC 2004 - Seoul, Korea, Republic of
Duration: 2004 Dec 22004 Dec 3


  • Entrusted undeniable signature
  • Threshold signature
  • Undeniable signature

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Threshold entrusted undeniable signature'. Together they form a unique fingerprint.

Cite this