Skip to main content

A group-oriented (t, n) undeniable signature scheme without trusted center

  • Session 8: Threshold Cryptography
  • Conference paper
  • First Online:
Book cover Information Security and Privacy (ACISP 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1172))

Included in the following conference series:

Abstract

We shall propose a new group-oriented undeniable signature scheme without the assistance of any trusted center in this paper. A single group public key, instead of all public keys of individual members, is used to represent the group. A transformation is applied to convert the group public key and the message to be signed into a public parameter and thus been transmitted out. With this public parameter, a paying customer will be able to authenticate the validity of the signature with the consent of all signers. It is worth mentioning that the new group-oriented undeniable signature possesses all of the characteristics that listed in Harn and Yang's. Besides, Harn and Yang's scheme is generalized in this research.

This research is partially supported by National Science Council, Taiwan, Republic of China, under grant NSC-84-2213-E-029-001.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Chaum and H. van Antwerpen, ”Undeniable Signatures,” In Advances in Cryptology, Proc. of Crypto'89, Santa Barbara, August 20–24, 1989, pp. 212–216.

    Google Scholar 

  2. C. C. Chang, and H. C. Lee, ”A New Generalized Group-Oriented Cryptoscheme without Trusted Centers,” IEEE Proceedings on Selected Areas in Communications, Vol. 11, No 5, June 1993, pp. 725–729.

    Google Scholar 

  3. Y. Desmedt, ”Society and Group Oriented Cryptography: A New Concept,” In Advances in Cryptology, Proc. of Crypto'87, Santa Barbara, August 1988, pp. 120–127.

    Google Scholar 

  4. Y. Desmedt, and Y. Frankel, ”Threshold Cryptosystem,” In Advances in Cryptology, Proc. of Crypto '89, Santa Barbara, August 1989, pp. 307–315.

    Google Scholar 

  5. Y. Desmedt, and Y. Frankel, ”Shared Generation of authenticators and Signatures,” In Advances in Cryptology, Proc. of Crypto'91, Santa Barbara, August 1991, pp. 457–469.

    Google Scholar 

  6. Y. Frankel. ”A Practical Protocol for Large Group Oriented Networks,” in Advances in Cryptology, Proc. of Eurocrypt'89, Houthalen, Belgium, April 1989, pp56–61.

    Google Scholar 

  7. L. Harn, ”Group-oriented (t, n) Threshold Signature and Digital Multisignature”, IEE Proceedings —Computers and Digital Techniques, Vol. 141, No. 5, Sept. 1994, pp. 307–313.

    Google Scholar 

  8. L. Harn and S. Yang, ”Group Oriented Undeniable Signature Schemes Without the Assistence of a Mutually Trusted Party,” In Advances in Cryptology, Proc. of Auscrypt'92, Gold Coast, Australia, Dec. 1992, pp. 3.22–27.

    Google Scholar 

  9. I.Ingemarsson, and G. J. Simmons, ”A Protocol to Set up Shared Secret Schemes without the Assistance of a Mutually Trusted Party,” In Advances in Cryptology, Proc. of Eurocrypt '90, May 1990, pp. 245–254.

    Google Scholar 

  10. C. H. Lin, ”On the Group Oriented Secure Communication Schemes,” The Third Conference on Information Security, Chiayi, Taiwan, May 1993.

    Google Scholar 

  11. C. H. Lin, and C. C. Chang, ”A Method for Constructing a Group-Oriented Cryptosystems,” Computer Communications, Vol. 17, No.11, 1994, pp. 805–808.

    Google Scholar 

  12. C. C. Tsai, ”Group-Oriented Cryptosystems and Signature Scheme”, Master Thesis, Institute of Information Engineering, National Chung-Kung University, Tainan, Taiwan, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Josef Pieprzyk Jennifer Seberry

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, CH., Wang, CT., Chang, CC. (1996). A group-oriented (t, n) undeniable signature scheme without trusted center. In: Pieprzyk, J., Seberry, J. (eds) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol 1172. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023305

Download citation

  • DOI: https://doi.org/10.1007/BFb0023305

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61991-8

  • Online ISBN: 978-3-540-49583-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics