Threshold entrusted undeniable signature

Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Entrusted undeniable signatures are like undeniable signatures, except that the disavowal protocol can only be run by a court in order to resolve a formal dispute. This paper introduces threshold entrusted undeniable signature scheme without trusted center. It is shown how the power to run a disavowal protocol of entrusted undeniable signature can be distributed to n agents such that any t of these can verify a signature. This facility is useful to solve "lie detector" problem of undeniable signatures.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science
EditorsC. Park, S. Chee
Number of pages9
Publication statusPublished - 2005
Externally publishedYes
Event7th International Conference on Information Security and Cryptology - ICISC 2004 - Seoul, Korea, Republic of
Duration: 2004 Dec 22004 Dec 3


Other7th International Conference on Information Security and Cryptology - ICISC 2004
CountryKorea, Republic of



  • Entrusted undeniable signature
  • Threshold signature
  • Undeniable signature

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Cite this

Kim, S-J., & Won, D. (2005). Threshold entrusted undeniable signature. In C. Park, & S. Chee (Eds.), Lecture Notes in Computer Science (Vol. 3506, pp. 195-203)