Skip to main content

A Directed Threshold Signature Scheme

  • Conference paper
  • First Online:
Next-Generation Networks

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 638))

Abstract

Directed signature is a solution of such problems when signed information is sensitive to message holder/signature receiver. Generally, in a directed signature, the signer is a single entity. But, when a sensitive message is signed by an organization and needs the approval of more than one entity, threshold signature scheme is a solution of this situation. To keep in mind, this paper presents a threshold directed signature scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Ingo. Theor. 31, 644–654 (1976)

    Google Scholar 

  2. Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Proceedings of Advances in Cryptology—Crypto 91, pp. 457–469. Springer, New York (1991)

    Google Scholar 

  3. Lim, C.H., Lee, P.J.: Security protocol. In: Proceedings of International Workshop, LNCS, vol. 1189. Springer, Cambridge, United Kingdom (1996)

    Google Scholar 

  4. Lim, C.H., Lee, P.J.: Modified Maurer-Yacobi, scheme and its applications. In: Advance in Cryptology—Auscrypt, LNCS, vol. 718, pp. 308–323 (1993)

    Google Scholar 

  5. Boyar, J., Chaum D., Damgard, I., Pederson, T.: Convertible undeniable signatures. In: Advances in Cryptology—Crypto 90, LNCS, vol. 537, pp. 189–205 (1991)

    Google Scholar 

  6. Chaum, D.: Designated confirmer signatures. In: Advances in Cryptology Euro crypt 94, LNCS, vol. 950, pp. 86–91 (1995)

    Google Scholar 

  7. Desmedt, Y.: Society and group oriented cryptography. In Proceedings of Advances in Cryptology—Crypto 87, pp. 457–469. Springer, New York (1988)

    Google Scholar 

  8. Harn, L.: (t, n) Threshold signature scheme and digital multisignature. In: Proceedings of workshop on cryptography and data security, 7–9 June, pp. 61–73. Chung Cheng Institute of Technology, ROC (1993)

    Google Scholar 

  9. Desmedt, Y.: Threshold cryptography. In: European Transactions on Telecommunications and Related Technologies. vol. 5, no. 4, pp. 35–43 (1994)

    Google Scholar 

  10. Gennaro, R., Jarecki Hkrawczyk, S., Rabin, T.: Robust threshold DSS signature. In: Proceedings of Advances in Cryptology—Euro Crypto 96, pp. 354–371. Springer, Berlin (1996)

    Google Scholar 

  11. Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161–174 (1994)

    Google Scholar 

  12. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Google Scholar 

  13. Lal, S., Kumar, M.: Application of directed signature scheme. South East Asian J. Math. Math. Sci. 2(1), 13–26. Also available at http://arxiv.org/ftp/cs/papers/0409/o409050.pdf

    Google Scholar 

  14. Lal, S., Kumar, M.: A directed signature scheme and its applications. In: Proceedings of National Conference on Information Security, New Delhi, 8–9 Jan 2003, pp. 124–132. Also available at http://arXiv.org/ftp/cs/papers/0409/o4090036.pdf (2003)

    Google Scholar 

  15. Guillou, L.C., Quisquater, J.J.: A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory. In: Advances in Cryptology—Eurocrypt 88, LNCS, vol. 330, pp. 123–128 (1988)

    Google Scholar 

  16. Umaprasada Rao, B., Vasudeva Reddy, P.: ID-based directed multi-proxy signature scheme from bilinear pairings. Int. J. Comput. Sci. Secur. (IJCSS) 5(1) (2011)

    Google Scholar 

  17. Zhang, J., Yang, Y., Niu, X.: Efficient provable secure ID-based directed signature scheme without random oracle. In: Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks, LNCS, vol. 5553, pp. 318–327. Springer (2009)

    Google Scholar 

  18. Vasudeva Reddy, P., Umaprasada Rao, B., Gowri, T.: ID-based directed threshold multisignature scheme from bilinear pairings. Int. J. Comput. Sci. Eng. 2(1), 74–79 (2009)

    Google Scholar 

  19. Sun, X., Li, J., Chen, G., Yung, S.: Identity-based directed signature scheme from bilinear pairings. eprint.iacr.org/2008/305.pdg

    Google Scholar 

  20. Lu, R., Lin, X., Cao, Z., Shao, J., Liang, X.: New (t, n) threshold directed signature scheme with provable security. Inf. Sci. 178(3), 756–765 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  21. Lu, R., Cao, Z.: A directed signature scheme based on RSA assumption. Int. J. Netw. Secur. 2(3), 182–186 (May 2006)

    Google Scholar 

  22. Wang, Y.: Directed signature based on identity. J. Yulin College 15(5), 1–3 (2005)

    Google Scholar 

  23. Blakely, G.R.: Safeguarding cryptographic keys. In: Proceedings of AGIPS 1979 National Computer Congress, vol. 48, pp. 313–317 (1979)

    Google Scholar 

  24. Blake, I.F., Van Oorschot, P.C., Vanstone, S.: Complexity issues for public key cryptography. In: Skwirzynski, J.K. (ed) Performance Limits in Communication, Theory and Practice, NATO ASI Series E: Applied Science, vol. 142, pp. 75–97. Kluwer Academic Publishers [Proceedings of the NATO Advanced Study Institute Ciocco, Castelvecchio Pascoli, Tuscany, Italy] (1986)

    Google Scholar 

  25. Chaum, D.: Zero- knowledge undeniable signatures. Advances in Cryptology—Eurocrypt 90, LNCS, vol. 473, pp. 458–464 (1991)

    Google Scholar 

  26. Mullin, R.C., Blake, I.F., Fuji-Hara, R., Vanstone, S.A.: Computing logarithms in a finite field of characteristic two. SIAM J. Alg. Disc. Math. 276–285 (1985)

    Google Scholar 

  27. NIST.: Digital signature standard. GIPS PUB 186 (1994)

    Google Scholar 

  28. Okamoto, T.: Designated confirmer signatures and public key encryption are equivalent. In: Advances in Cryptology—Crypto 94, LNCS, vol. 839, pp. 61–74 (1994)

    Google Scholar 

  29. Odlyzko. A.M.: Discrete logs in a finite field and their cryptographic significance. In: Cot, N., Beth, T., Ingemarsson, I. (eds.) Advances in Cryptology—Eurocrypt 84, LNCS, vol. 209, pp. 224–314 (1984)

    Google Scholar 

  30. Rabin, T.: A simplified approach to threshold and proactive RSA. In: Proceedings of Advances in Cryptology—Crypto, vol. 98, pp. 89–104. Springer, New York (1998)

    Google Scholar 

  31. Yen, S.M., Laih, C.S.: New digital signature scheme based on discrete logarithm. Electron. Lett. 29(12), 1120–1121 (1993)

    Article  Google Scholar 

  32. Zheng, Y., Matsummoto, T., Imai, H.: Structural properties of one-way hash functions. In: Proceedings of Advances in Cryptology—Crypto 90, pp. 285–302. Springer (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manoj Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, M. (2018). A Directed Threshold Signature Scheme. In: Lobiyal, D., Mansotra, V., Singh, U. (eds) Next-Generation Networks. Advances in Intelligent Systems and Computing, vol 638. Springer, Singapore. https://doi.org/10.1007/978-981-10-6005-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6005-2_18

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6004-5

  • Online ISBN: 978-981-10-6005-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics