Threshold entrusted undeniable signature

  • Authors:
  • Seungjoo Kim;Dongho Won

  • Affiliations:
  • ISAC Lab. (Information Security And Cryptology Lab.), School of Information and Communication Engineering, Sungkyunkwan University, Suwon-si, Gyeonggi-do, Korea;ICS Lab. (Information & Communications Security Lab.), School of Information and Communication Engineering, Sungkyunkwan University, Suwon-si, Gyeonggi-do, Korea

  • Venue:
  • ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Entrusted undeniable signatures are like undeniable signatures, except that the disavowal protocol can only be run by a court in order to resolve a formal dispute. This paper introduces threshold entrusted undeniable signature scheme without trusted center. It is shown how the power to run a disavowal protocol of entrusted undeniable signature can be distributed to n agents such that any t of these can verify a signature. This facility is useful to solve “lie detector” problem of undeniable signatures.