A practical solution to the (t, n) threshold untraceable signature with (k, l) verification scheme

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The (t, n) threshold signature scheme can delegate the signing capability to all n participants in a group, and at least ; participants can cooperatively sign a message on behalf of the group, where t ≤ n . For the group communication in the real society, the verification site also needs to be restricted in its associated access privileges. Therefore, this paper proposes a practical solution to the (t, n) threshold untraceable signature with (k, l) verification scheme, which requires that k out of l verifiers or more can verify the threshold signature on behalf of the verification group. Compared with the previous works, such as Wang et al.'s scheme and Chang et al.'s scheme, our proposed scheme is more practical and expansible. Our scheme allows each group to be both a signing party and a verification party, and the shadows of all group members are no need to be redistributed after the initialization has been finished. In addition, the share distribution center (SDC) is not required in our scheme. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Yang, J. H., Chang, C. C., & Wang, C. H. (2006). A practical solution to the (t, n) threshold untraceable signature with (k, l) verification scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4159 LNCS, pp. 998–1007). Springer Verlag. https://doi.org/10.1007/11833529_101

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free