A Novel Undeniable (t, n)-Threshold Signature with Cheater Identification

被引:2
作者
Tseng, Yi-Fan [1 ]
Lin, Yan-Bin [1 ]
机构
[1] Natl Chenchi Univ, Dept Comp Sci, Taipei 11605, Taiwan
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 06期
关键词
digital signature; undeniable signature; threshold signature; cryptanalysis; SECURITY; SCHEME; PROOFS;
D O I
10.3390/sym14061118
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A digital signature is one of the most widely used cryptographic primitives in asymmetry cryptography. According to the security requirements in different symmetry or asymmetry network models, various digital signatures have been developed in the literature. To protect the right of the signer, Chaum and Antrepen first introduced the concept of an undeniable signature, where interactive protocols are needed for the verification process. Besides, a signer can, also, perform a disavowal protocol to prove that they did not sign the message. On the other hand, threshold cryptography is, usually, used to protect the system from a single point of failure. In a (t,n)-threshold signature scheme, as long as t people in the group of n people participate, the signature can be smoothly signed. By combining these two features, an undeniable threshold signature enjoys the advantages from both sides. After our survey, we found that the existing undeniable threshold signature schemes are either insecure or apply impractical assumptions. Thus, in this manuscript, we aim at designing a novel and provably secure undeniable threshold signature scheme. The proposed scheme is formally proven to be unforgeable and invisible. Besides, our scheme supports cheater identification, which allows one to find the cheater, when a signing protocol fails. Moreover, the proposed scheme can be performed without the help of trusted third parties or secure cryptographic modules, which would be more practical when our scheme is deployed in real-world applications.
引用
收藏
页数:16
相关论文
共 44 条
[1]   Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations [J].
Aleksandrova, E. B. ;
Shkorkina, E. N. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) :1160-1163
[2]   Threshold ECDSA with an Offline Recovery Party [J].
Battagliola, Michele ;
Longo, Riccardo ;
Meneghetti, Alessio ;
Sala, Massimiliano .
MEDITERRANEAN JOURNAL OF MATHEMATICS, 2022, 19 (01)
[3]   Short Threshold Dynamic Group Signatures [J].
Camenisch, Jan ;
Drijvers, Manu ;
Lehmann, Anja ;
Neven, Gregory ;
Towa, Patrick .
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2020, 2020, 12238 :401-423
[4]  
CHAUM D, 1990, LECT NOTES COMPUT SC, V435, P212
[5]  
CHAUM D, 1991, LECT NOTES COMPUT SC, V473, P458
[6]  
Damgard I, 1996, LECT NOTES COMPUT SC, V1070, P372
[7]  
Damgard Ivan., 2003, STOC, P426
[8]  
DESMEDT YG, 1994, EUR T TELECOMMUN, V5, P449
[9]  
Di Crescenzo G, 2001, LECT NOTES COMPUT SC, V2045, P40
[10]  
Di Crescenzo G., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P141, DOI 10.1145/276698.276722