On Signature Schemes with Threshold Veriication Detecting Malicious Veriiers on Signature Schemes with Threshold Veriication Detecting Malicious Veriiers

نویسندگان

  • Holger Petersen
  • Markus Michels
چکیده

While in the ordinary digital signature model one veriier is suucient to check the validity of a given signature, there are situations in which only t out of a group of n veriiers should be able to verify the signatures. These veriiers can either be anonymous, non-anonymous or convertible non-anonymous. So far, only schemes for the anonymous shared veriication signature concept have been suggested. They suuer from diierent drawbacks, especially the assumption, that all t veriiers must be honest during the veriication. In this paper, the drawbacks are discussed and an improved scheme is suggested. Furthermore, new protocols for the two other concepts are presented. Some solutions will demonstrate the close relation between signature schemes with threshold veriication and threshold cryptosystems. Abstract. While in the ordinary digital signature model one veriier is suucient to check the validity of a given signature, there are situations in which only t out of a group of n veriiers should be able to verify the signatures. These veriiers can either be anonymous, non-anonymous or convertible non-anonymous. So far, only schemes for the anonymous shared veriication signature concept have been suggested. They suuer from diierent drawbacks, especially the assumption, that all t veriiers must be honest during the veriication. In this paper, the drawbacks are discussed and an improved scheme is suggested. Furthermore, new protocols for the two other concepts are presented. Some solutions will demonstrate the close relation between signature schemes with threshold veriication and threshold cryptosystems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Signature Schemes with Threshold Verification Detecting Malicious Verifiers

While in the ordinary digital signature concept one veriier is suucient to check the validity of a given signature, there are situations in which only t out of a group of n veriiers should be able to verify the signatures. These veriiers can either be anonymous, non-anonymous or convertible non-anonymous. So far, only schemes for the anonymous shared veriication signature concept have been sugg...

متن کامل

Proof Linking: Modular Veri cation of Mobile Programs in the Presence of Lazy, Dynamic Linking

Although mobile code systems typically employ link-time code veriiers to protect host computers from potentially malicious code, implementation aws in the veriiers may still leave the host system vulnerable to attack. Compounding the inherent complexity of the veriication algorithms themselves, the need to support lazy, dynamic linking in mobile code systems typically leads to architectures tha...

متن کامل

Identi cation of Bad Signatures in BatchesJaros

The paper addresses the problem of bad signature identii-cation in batch veriication of digital signatures. The number of generic tests necessary to identify all bad signatures in a batch instance, is used to measure the eeciency of veriiers. The divide-and-conquer veri-er DCV(x; n) is deened. The veriier identiies all bad signatures in a batch instance x of the length n by repeatedly splitting...

متن کامل

Blind Threshold Signatures Based on Discrete Logarithm

In this paper, we propose two group-oriented (t; n) blind threshold signature schemes based on the discrete logarithm problem. By these schemes, any t out of n signers in a group can represent the group to sign blind threshold signatures. In our schemes, the size of a threshold signature is the same as the size of an individual signature and the signature veriication process is simpliied by mea...

متن کامل

Cryptanalysis of Threshold Proxy Signature Schemes 1 )

A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can cooperatively sign messages on behalf of the original signer. In the paper, we review the security of two nonrepudiable threshold proxy signature schemes. We show that Tzeng et al.’s threshold proxy signature scheme is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997