Threshold entrusted undeniable signature

Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Entrusted undeniable signatures are like undeniable signatures, except that the disavowal protocol can only be run by a court in order to resolve a formal dispute. This paper introduces threshold entrusted undeniable signature scheme without trusted center. It is shown how the power to run a disavowal protocol of entrusted undeniable signature can be distributed to n agents such that any t of these can verify a signature. This facility is useful to solve "lie detector" problem of undeniable signatures.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science
EditorsC. Park, S. Chee
Pages195-203
Number of pages9
Volume3506
Publication statusPublished - 2005
Externally publishedYes
Event7th International Conference on Information Security and Cryptology - ICISC 2004 - Seoul, Korea, Republic of
Duration: 2004 Dec 22004 Dec 3

Other

Other7th International Conference on Information Security and Cryptology - ICISC 2004
CountryKorea, Republic of
CitySeoul
Period04/12/204/12/3

    Fingerprint

Keywords

  • Entrusted undeniable signature
  • Threshold signature
  • Undeniable signature

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Cite this

Kim, S-J., & Won, D. (2005). Threshold entrusted undeniable signature. In C. Park, & S. Chee (Eds.), Lecture Notes in Computer Science (Vol. 3506, pp. 195-203)