Entrusted undeniable signatures are like undeniable signatures, except that the disavowal protocol can only be run by a court in order to resolve a formal dispute. This paper introduces threshold entrusted undeniable signature scheme without trusted center. It is shown how the power to run a disavowal protocol of entrusted undeniable signature can be distributed to n agents such that any t of these can verify a signature. This facility is useful to solve "lie detector" problem of undeniable signatures. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Kim, S., & Won, D. (2005). Threshold entrusted undeniable signature. In Lecture Notes in Computer Science (Vol. 3506, pp. 195–203). Springer Verlag. https://doi.org/10.1007/11496618_15
Mendeley helps you to discover research relevant for your work.