Abstract
Entrusted undeniable signatures are like undeniable signatures, except that the disavowal protocol can only be run by a court in order to resolve a formal dispute. This paper introduces threshold entrusted undeniable signature scheme without trusted center. It is shown how the power to run a disavowal protocol of entrusted undeniable signature can be distributed to n agents such that any t of these can verify a signature. This facility is useful to solve "lie detector" problem of undeniable signatures.
Original language | English |
---|---|
Pages (from-to) | 195-203 |
Number of pages | 9 |
Journal | Lecture Notes in Computer Science |
Volume | 3506 |
DOIs | |
Publication status | Published - 2005 |
Externally published | Yes |
Event | 7th International Conference on Information Security and Cryptology - ICISC 2004 - Seoul, Korea, Republic of Duration: 2004 Dec 2 → 2004 Dec 3 |
Keywords
- Entrusted undeniable signature
- Threshold signature
- Undeniable signature
ASJC Scopus subject areas
- Theoretical Computer Science
- Computer Science(all)