An enhanced (t,n) threshold directed signature scheme

被引:7
|
作者
Hwang, Jung Yeon [1 ]
Kim, Hyoung Joong [2 ]
Lee, Dong Hoon [2 ]
Song, Boyeon [3 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305700, South Korea
[2] Korea Univ, Grad Sch Informat Secur, Seoul 136701, South Korea
[3] Korea Inst Sci & Technol Informat, Taejon 305806, South Korea
基金
新加坡国家研究基金会;
关键词
Directed signature; Threshold; Designated verifier; Rogue-key attack; Forgery; SCALABLE PROTOCOLS; MULTISIGNATURES;
D O I
10.1016/j.ins.2014.02.038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A directed signature scheme is devised to achieve directivity for verification such that only a designated verifier can check the validity of a signature and, in times of trouble, any third party can verify the signature with the help of the signer or the designated verifier. A threshold directed signature scheme distributes responsibility and authority for generating a directed signature to several users via a threshold mechanism. Lu et al. recently proposed a novel (t, n) threshold directed signature scheme. In this paper, we show that the scheme is vulnerable to a rogue-key attack which is mounted by an adversary who can arbitrarily select his or her public key. Through the rogue-key attack, the adversary can forge a signature on any message for a set of signers. In order to thwart such a rogue-key attack, we propose an enhanced (t, n) threshold directed signature scheme with a reliable key registration protocol. The protocol guarantees that a user should have access to the secret key corresponding to the user's public key. Under the computational Diffie-Hellman assumption, we prove that the improved scheme is secure, that is, it achieves existential unforgeability under the chosen message attack, invisibility, and transitivity in the registered key model. We stress that the security of our improved scheme does not depend on a specific broadcast channel for synchronous message transmission. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:284 / 292
页数:9
相关论文
共 50 条
  • [31] A (t, n) threshold quantum visual secret sharing
    Liu, Wenjie
    Xu, Yinsong
    Chen, Junxiu
    Yang, Ching-Nung
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 33 (02) : 74 - 84
  • [32] Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Tsai, Pei-Ling
    INFORMATION SCIENCES, 2007, 177 (02) : 543 - 549
  • [33] Directed Proxy Signature in the Standard Model
    明洋
    王育民
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 663 - 671
  • [34] Directed proxy signature in the standard model
    Ming Y.
    Wang Y.-M.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (6) : 663 - 671
  • [35] Threshold proxy re-signature
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2011, 24 (04) : 816 - 824
  • [36] Authenticated encryption scheme with (t, n) shared verification
    Hsu, CL
    Wu, TC
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 117 - 120
  • [37] Threshold proxy re-signature
    Piyi Yang
    Zhenfu Cao
    Xiaolei Dong
    Journal of Systems Science and Complexity, 2011, 24 : 816 - 824
  • [38] THRESHOLD PROXY RE-SIGNATURE
    Piyi YANG·Zhenfu CAO·Xiaolei DONG Department of Computer Science and Engineering
    JournalofSystemsScience&Complexity, 2011, 24 (04) : 816 - 824
  • [39] A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model
    Li, Xincheng
    Zhou, Lifeng
    Yin, Xinchun
    Ning, Jianting
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) : 10865 - 10879
  • [40] Provably secure multi-signature scheme based on the standard SM2 signature scheme
    Xiao, Yuchen
    Zhang, Lei
    Yang, Yafang
    Wu, Wei
    Ning, Jianting
    Huang, Xinyi
    COMPUTER STANDARDS & INTERFACES, 2024, 89