An enhanced (t,n) threshold directed signature scheme

被引:7
|
作者
Hwang, Jung Yeon [1 ]
Kim, Hyoung Joong [2 ]
Lee, Dong Hoon [2 ]
Song, Boyeon [3 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305700, South Korea
[2] Korea Univ, Grad Sch Informat Secur, Seoul 136701, South Korea
[3] Korea Inst Sci & Technol Informat, Taejon 305806, South Korea
基金
新加坡国家研究基金会;
关键词
Directed signature; Threshold; Designated verifier; Rogue-key attack; Forgery; SCALABLE PROTOCOLS; MULTISIGNATURES;
D O I
10.1016/j.ins.2014.02.038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A directed signature scheme is devised to achieve directivity for verification such that only a designated verifier can check the validity of a signature and, in times of trouble, any third party can verify the signature with the help of the signer or the designated verifier. A threshold directed signature scheme distributes responsibility and authority for generating a directed signature to several users via a threshold mechanism. Lu et al. recently proposed a novel (t, n) threshold directed signature scheme. In this paper, we show that the scheme is vulnerable to a rogue-key attack which is mounted by an adversary who can arbitrarily select his or her public key. Through the rogue-key attack, the adversary can forge a signature on any message for a set of signers. In order to thwart such a rogue-key attack, we propose an enhanced (t, n) threshold directed signature scheme with a reliable key registration protocol. The protocol guarantees that a user should have access to the secret key corresponding to the user's public key. Under the computational Diffie-Hellman assumption, we prove that the improved scheme is secure, that is, it achieves existential unforgeability under the chosen message attack, invisibility, and transitivity in the registered key model. We stress that the security of our improved scheme does not depend on a specific broadcast channel for synchronous message transmission. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:284 / 292
页数:9
相关论文
共 50 条
  • [21] Identity-Based Directed Signature Scheme without Bilinear Pairings
    Rao, R. R. V. Krishna
    Gayathri, N. B.
    Reddy, P. Vasudeva
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 335 - 353
  • [22] Forward-Secure Threshold Attribute-Based Signature Scheme
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    COMPUTER JOURNAL, 2015, 58 (10): : 2492 - 2506
  • [23] A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings
    Yang, Tao
    Xiong, Hu
    Hu, Jianbin
    Wang, Yonggang
    Deng, Yong
    Xiao, Biao
    Chen, Zhong
    WEB TECHNOLOGIES AND APPLICATIONS, 2011, 6612 : 376 - +
  • [24] A verifiable (t, n) threshold quantum state sharing scheme on IBM quantum cloud platform
    Xiuli Song
    Yanbing Liu
    Min Xiao
    Hongyao Deng
    Shuai Yang
    Quantum Information Processing, 2020, 19
  • [25] A New Lattice-Based Threshold Attribute-Based Signature Scheme
    Wang, Qingbin
    Chen, Shaozhen
    Ge, Aijun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 406 - 420
  • [26] Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
    Wang, Na
    Cai, Yuanyuan
    Fu, Junsong
    Chen, Xiqi
    IEEE ACCESS, 2020, 8 : 20799 - 20804
  • [27] An Efficient ID-Based Directed Signature Scheme from Optimal Eta Pairing
    Ku, Junhua
    Yun, Dawei
    Zheng, Bing
    Wei, She
    COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, 2012, 316 : 440 - 448
  • [28] A certificateless threshold signature scheme without parings in P2P networks
    Xu Z.
    Li Z.
    Zhang W.
    ICETC 2010 - 2010 2nd International Conference on Education Technology and Computer, 2010, 4 : V4367 - V4370
  • [29] Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    ADVANCES IN NEURAL NETWORKS - ISNN 2009, PT 3, PROCEEDINGS, 2009, 5553 : 318 - +
  • [30] Efficient Threshold Attribute-Based Signature Scheme for Unmanned Aerial Vehicle (UAV) Networks
    He, Lei
    Gan, Yong
    Yin, Yifeng
    ELECTRONICS, 2025, 14 (02):