An enhanced (t,n) threshold directed signature scheme
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hwang, Jung Yeon | - |
dc.contributor.author | Kim, Hyoung Joong | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.contributor.author | Song, Boyeon | - |
dc.date.accessioned | 2021-09-05T06:10:39Z | - |
dc.date.available | 2021-09-05T06:10:39Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2014-08-10 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/97697 | - |
dc.description.abstract | A directed signature scheme is devised to achieve directivity for verification such that only a designated verifier can check the validity of a signature and, in times of trouble, any third party can verify the signature with the help of the signer or the designated verifier. A threshold directed signature scheme distributes responsibility and authority for generating a directed signature to several users via a threshold mechanism. Lu et al. recently proposed a novel (t, n) threshold directed signature scheme. In this paper, we show that the scheme is vulnerable to a rogue-key attack which is mounted by an adversary who can arbitrarily select his or her public key. Through the rogue-key attack, the adversary can forge a signature on any message for a set of signers. In order to thwart such a rogue-key attack, we propose an enhanced (t, n) threshold directed signature scheme with a reliable key registration protocol. The protocol guarantees that a user should have access to the secret key corresponding to the user's public key. Under the computational Diffie-Hellman assumption, we prove that the improved scheme is secure, that is, it achieves existential unforgeability under the chosen message attack, invisibility, and transitivity in the registered key model. We stress that the security of our improved scheme does not depend on a specific broadcast channel for synchronous message transmission. (C) 2014 Elsevier Inc. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.subject | GROUP KEY EXCHANGE | - |
dc.subject | SCALABLE PROTOCOLS | - |
dc.subject | RANDOM ORACLES | - |
dc.subject | MULTISIGNATURES | - |
dc.title | An enhanced (t,n) threshold directed signature scheme | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Hyoung Joong | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1016/j.ins.2014.02.038 | - |
dc.identifier.scopusid | 2-s2.0-84900801834 | - |
dc.identifier.wosid | 000337199200019 | - |
dc.identifier.bibliographicCitation | INFORMATION SCIENCES, v.275, pp.284 - 292 | - |
dc.relation.isPartOf | INFORMATION SCIENCES | - |
dc.citation.title | INFORMATION SCIENCES | - |
dc.citation.volume | 275 | - |
dc.citation.startPage | 284 | - |
dc.citation.endPage | 292 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordPlus | GROUP KEY EXCHANGE | - |
dc.subject.keywordPlus | SCALABLE PROTOCOLS | - |
dc.subject.keywordPlus | RANDOM ORACLES | - |
dc.subject.keywordPlus | MULTISIGNATURES | - |
dc.subject.keywordAuthor | Directed signature | - |
dc.subject.keywordAuthor | Threshold | - |
dc.subject.keywordAuthor | Designated verifier | - |
dc.subject.keywordAuthor | Rogue-key attack | - |
dc.subject.keywordAuthor | Forgery | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.