An enhanced (t,n) threshold directed signature scheme

被引:7
|
作者
Hwang, Jung Yeon [1 ]
Kim, Hyoung Joong [2 ]
Lee, Dong Hoon [2 ]
Song, Boyeon [3 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305700, South Korea
[2] Korea Univ, Grad Sch Informat Secur, Seoul 136701, South Korea
[3] Korea Inst Sci & Technol Informat, Taejon 305806, South Korea
基金
新加坡国家研究基金会;
关键词
Directed signature; Threshold; Designated verifier; Rogue-key attack; Forgery; SCALABLE PROTOCOLS; MULTISIGNATURES;
D O I
10.1016/j.ins.2014.02.038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A directed signature scheme is devised to achieve directivity for verification such that only a designated verifier can check the validity of a signature and, in times of trouble, any third party can verify the signature with the help of the signer or the designated verifier. A threshold directed signature scheme distributes responsibility and authority for generating a directed signature to several users via a threshold mechanism. Lu et al. recently proposed a novel (t, n) threshold directed signature scheme. In this paper, we show that the scheme is vulnerable to a rogue-key attack which is mounted by an adversary who can arbitrarily select his or her public key. Through the rogue-key attack, the adversary can forge a signature on any message for a set of signers. In order to thwart such a rogue-key attack, we propose an enhanced (t, n) threshold directed signature scheme with a reliable key registration protocol. The protocol guarantees that a user should have access to the secret key corresponding to the user's public key. Under the computational Diffie-Hellman assumption, we prove that the improved scheme is secure, that is, it achieves existential unforgeability under the chosen message attack, invisibility, and transitivity in the registered key model. We stress that the security of our improved scheme does not depend on a specific broadcast channel for synchronous message transmission. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:284 / 292
页数:9
相关论文
共 50 条
  • [41] Detection and identification of cheaters in (t, n) secret sharing scheme
    Harn, Lein
    Lin, Changlu
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 52 (01) : 15 - 24
  • [42] Efficient, XOR-Based, Ideal (t,n) - threshold Schemes
    Chen, Liqun
    Laing, Thalia M.
    Martin, Keith M.
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 467 - 483
  • [43] Research on Image Information Hiding Method Based On (T,N) Threshold
    Fan Hongwei
    Zhu Li
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 1158 - 1161
  • [44] An efficient (t, n) threshold quantum secret sharing without entanglement
    Qin, Huawang
    Dai, Yuewei
    MODERN PHYSICS LETTERS B, 2016, 30 (12):
  • [45] Directed Digital Signature on Isogenies of Elliptic Curves
    Aleksandrova, E. B.
    Shtyrkina, A. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 1059 - 1064
  • [46] The Insecurity of a Certificateless Undeniable Signature Scheme
    Behnia, Rouzbeh
    Heng, Swee-Huay
    2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2016, : 582 - 587
  • [47] How to Aggregate the CL Signature Scheme
    Schroeder, Dominique
    COMPUTER SECURITY - ESORICS 2011, 2011, 6879 : 298 - 314
  • [48] Digital Signature Scheme over Lattices
    Chand, Ravinesh
    Valluri, Maheswara Rao
    Khan, M. G. M.
    25TH INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2021), 2021, : 71 - 78
  • [49] An efficient certificateless undeniable signature scheme
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Gan, Che-Sheng
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2015, 92 (07) : 1313 - 1328
  • [50] Robust T-out-of-N proxy signature based on RSA cryptosystems
    Chang, Ya-Fen
    Chang, Chin-Chen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (02): : 425 - 431