Abstract
We shall propose a new group-oriented undeniable signature scheme without the assistance of any trusted center in this paper. A single group public key, instead of all public keys of individual members, is used to represent the group. A transformation is applied to convert the group public key and the message to be signed into a public parameter and thus been transmitted out. With this public parameter, a paying customer will be able to authenticate the validity of the signature with the consent of all signers. It is worth mentioning that the new group-oriented undeniable signature possesses all of the characteristics that listed in Harn and Yang's. Besides, Harn and Yang's scheme is generalized in this research.
This research is partially supported by National Science Council, Taiwan, Republic of China, under grant NSC-84-2213-E-029-001.
Preview
Unable to display preview. Download preview PDF.
References
D. Chaum and H. van Antwerpen, ”Undeniable Signatures,” In Advances in Cryptology, Proc. of Crypto'89, Santa Barbara, August 20–24, 1989, pp. 212–216.
C. C. Chang, and H. C. Lee, ”A New Generalized Group-Oriented Cryptoscheme without Trusted Centers,” IEEE Proceedings on Selected Areas in Communications, Vol. 11, No 5, June 1993, pp. 725–729.
Y. Desmedt, ”Society and Group Oriented Cryptography: A New Concept,” In Advances in Cryptology, Proc. of Crypto'87, Santa Barbara, August 1988, pp. 120–127.
Y. Desmedt, and Y. Frankel, ”Threshold Cryptosystem,” In Advances in Cryptology, Proc. of Crypto '89, Santa Barbara, August 1989, pp. 307–315.
Y. Desmedt, and Y. Frankel, ”Shared Generation of authenticators and Signatures,” In Advances in Cryptology, Proc. of Crypto'91, Santa Barbara, August 1991, pp. 457–469.
Y. Frankel. ”A Practical Protocol for Large Group Oriented Networks,” in Advances in Cryptology, Proc. of Eurocrypt'89, Houthalen, Belgium, April 1989, pp56–61.
L. Harn, ”Group-oriented (t, n) Threshold Signature and Digital Multisignature”, IEE Proceedings —Computers and Digital Techniques, Vol. 141, No. 5, Sept. 1994, pp. 307–313.
L. Harn and S. Yang, ”Group Oriented Undeniable Signature Schemes Without the Assistence of a Mutually Trusted Party,” In Advances in Cryptology, Proc. of Auscrypt'92, Gold Coast, Australia, Dec. 1992, pp. 3.22–27.
I.Ingemarsson, and G. J. Simmons, ”A Protocol to Set up Shared Secret Schemes without the Assistance of a Mutually Trusted Party,” In Advances in Cryptology, Proc. of Eurocrypt '90, May 1990, pp. 245–254.
C. H. Lin, ”On the Group Oriented Secure Communication Schemes,” The Third Conference on Information Security, Chiayi, Taiwan, May 1993.
C. H. Lin, and C. C. Chang, ”A Method for Constructing a Group-Oriented Cryptosystems,” Computer Communications, Vol. 17, No.11, 1994, pp. 805–808.
C. C. Tsai, ”Group-Oriented Cryptosystems and Signature Scheme”, Master Thesis, Institute of Information Engineering, National Chung-Kung University, Tainan, Taiwan, 1995.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, CH., Wang, CT., Chang, CC. (1996). A group-oriented (t, n) undeniable signature scheme without trusted center. In: Pieprzyk, J., Seberry, J. (eds) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol 1172. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023305
Download citation
DOI: https://doi.org/10.1007/BFb0023305
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61991-8
Online ISBN: 978-3-540-49583-3
eBook Packages: Springer Book Archive