Threshold entrusted undeniable signature

2Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Entrusted undeniable signatures are like undeniable signatures, except that the disavowal protocol can only be run by a court in order to resolve a formal dispute. This paper introduces threshold entrusted undeniable signature scheme without trusted center. It is shown how the power to run a disavowal protocol of entrusted undeniable signature can be distributed to n agents such that any t of these can verify a signature. This facility is useful to solve "lie detector" problem of undeniable signatures. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Kim, S., & Won, D. (2005). Threshold entrusted undeniable signature. In Lecture Notes in Computer Science (Vol. 3506, pp. 195–203). Springer Verlag. https://doi.org/10.1007/11496618_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free