A Signature Scheme with (t, n) Shared Verification and Message Recovery

نویسندگان

  • Chin-Chen Chang
  • Kuo-Lun Chen
چکیده

In this paper, a new signature scheme is proposed, by which any signer can sign a message to a group of n verifiers with her/his own secret key and the public key of the group. Once the group receives the signed ciphertext generated by the signer, any t verifiers in the group can cooperate to verify and recover the message with their secret keys and the public key of the signer. The proposed scheme in this paper works perfectly and efficiently in providing signature schemes with (t, n) shared verifications. Through the analysis on the scheme, it is shown that the performance of this proposed scheme is better than many others with the same function.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Threshold untraceable signature for group communications - Communications, IEE Proceedings-

Lee et al. have proposed an untraceable (t, n) threshold signature scheme which can be extended to give the original signers the ability to prove they are the true signers. The present authors add the requirement of (k, l) threshold-shared verification to the scheme of Lee et al. In the proposed scheme, any t participants can represent a group to sign messages with/without anonymity, and k veri...

متن کامل

A General Threshold Signature and Authenticated Encryption Scheme Based on ElGamal System

Based on ElGamal system, a group-oriented threshold signature and authenticated encryption scheme was put forward. After being signed by a signer group employing ) , ( n t threshold signature scheme, the message m was transmitted to a particular verifier group, and then the signature was verified through the cooperation of k ones from the verifier group with l members. Similarly, a general auth...

متن کامل

ID-based Signcryption Scheme with (t, n) Shared Unsigncryption

An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero knowledge proof for the equality of two discrete logarithms based on the bilinear map. In this scheme, any third party can verify the validity of the signature, but only more than t members in the recipient group can coope...

متن کامل

Identity-based Partial Message Recovery

We firstly proposed a new notion of short identity-based signature scheme. We argue that the identity-based environment is essential in some scenarios. The notion of short identity-based signature schemes can be viewed as identity-based (partial) message recovery signatures. Signature schemes with message recovery has been extensively studied in the literature. This problem is somewhat related ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004