Threshold entrusted undeniable signature

Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Entrusted undeniable signatures are like undeniable signatures, except that the disavowal protocol can only be run by a court in order to resolve a formal dispute. This paper introduces threshold entrusted undeniable signature scheme without trusted center. It is shown how the power to run a disavowal protocol of entrusted undeniable signature can be distributed to n agents such that any t of these can verify a signature. This facility is useful to solve "lie detector" problem of undeniable signatures.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science
EditorsC. Park, S. Chee
Pages195-203
Number of pages9
Volume3506
Publication statusPublished - 2005
Externally publishedYes
Event7th International Conference on Information Security and Cryptology - ICISC 2004 - Seoul, Korea, Republic of
Duration: 2004 Dec 22004 Dec 3

Other

Other7th International Conference on Information Security and Cryptology - ICISC 2004
CountryKorea, Republic of
CitySeoul
Period04/12/204/12/3

Fingerprint

Detectors

Keywords

  • Entrusted undeniable signature
  • Threshold signature
  • Undeniable signature

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Cite this

Kim, S-J., & Won, D. (2005). Threshold entrusted undeniable signature. In C. Park, & S. Chee (Eds.), Lecture Notes in Computer Science (Vol. 3506, pp. 195-203)

Threshold entrusted undeniable signature. / Kim, Seung-Joo; Won, Dongho.

Lecture Notes in Computer Science. ed. / C. Park; S. Chee. Vol. 3506 2005. p. 195-203.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, S-J & Won, D 2005, Threshold entrusted undeniable signature. in C Park & S Chee (eds), Lecture Notes in Computer Science. vol. 3506, pp. 195-203, 7th International Conference on Information Security and Cryptology - ICISC 2004, Seoul, Korea, Republic of, 04/12/2.
Kim S-J, Won D. Threshold entrusted undeniable signature. In Park C, Chee S, editors, Lecture Notes in Computer Science. Vol. 3506. 2005. p. 195-203
Kim, Seung-Joo ; Won, Dongho. / Threshold entrusted undeniable signature. Lecture Notes in Computer Science. editor / C. Park ; S. Chee. Vol. 3506 2005. pp. 195-203
@inproceedings{56debe7f64ef4ad7b4cdfd4fdac7503b,
title = "Threshold entrusted undeniable signature",
abstract = "Entrusted undeniable signatures are like undeniable signatures, except that the disavowal protocol can only be run by a court in order to resolve a formal dispute. This paper introduces threshold entrusted undeniable signature scheme without trusted center. It is shown how the power to run a disavowal protocol of entrusted undeniable signature can be distributed to n agents such that any t of these can verify a signature. This facility is useful to solve {"}lie detector{"} problem of undeniable signatures.",
keywords = "Entrusted undeniable signature, Threshold signature, Undeniable signature",
author = "Seung-Joo Kim and Dongho Won",
year = "2005",
language = "English",
volume = "3506",
pages = "195--203",
editor = "C. Park and S. Chee",
booktitle = "Lecture Notes in Computer Science",

}

TY - GEN

T1 - Threshold entrusted undeniable signature

AU - Kim, Seung-Joo

AU - Won, Dongho

PY - 2005

Y1 - 2005

N2 - Entrusted undeniable signatures are like undeniable signatures, except that the disavowal protocol can only be run by a court in order to resolve a formal dispute. This paper introduces threshold entrusted undeniable signature scheme without trusted center. It is shown how the power to run a disavowal protocol of entrusted undeniable signature can be distributed to n agents such that any t of these can verify a signature. This facility is useful to solve "lie detector" problem of undeniable signatures.

AB - Entrusted undeniable signatures are like undeniable signatures, except that the disavowal protocol can only be run by a court in order to resolve a formal dispute. This paper introduces threshold entrusted undeniable signature scheme without trusted center. It is shown how the power to run a disavowal protocol of entrusted undeniable signature can be distributed to n agents such that any t of these can verify a signature. This facility is useful to solve "lie detector" problem of undeniable signatures.

KW - Entrusted undeniable signature

KW - Threshold signature

KW - Undeniable signature

UR - http://www.scopus.com/inward/record.url?scp=24944433029&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=24944433029&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:24944433029

VL - 3506

SP - 195

EP - 203

BT - Lecture Notes in Computer Science

A2 - Park, C.

A2 - Chee, S.

ER -