18
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Undeniable (t, n)‐threshold signature scheme with cheater identification

&
Pages 775-780 | Received 12 May 1998, Accepted 20 Aug 1998, Published online: 03 Mar 2011

Reference

  • Chaum , D. 1991 . “Zero‐knowledge Undeniable Signatures,” . In Advances in Cryptology ‐EUROCRYPT'90 , 458 – 464 . Berlin : Springer‐Verlag .
  • Chaum , D. 1992 . “Some Weaknesses of “Weaknesses of Undeniable Signatures”,” . In Advances in Cryptology ‐ EUROCRYPT'91 , 554 – 556 . Berlin : Springer‐Verlag .
  • Chaum, D., “Provers Can Limit the Number of Verifiers,” pre‐print available from the author.
  • Chaum , D. and van Antwerpen , H. 1990 . “Undeniable Signatures,” . In Advances in Cryptology ‐CRYPTO'89 , 212 – 216 . Berlin : Springer‐Verlag .
  • Desmedt , Y. 1988 . “Society and Group Oriented Cryptography,” . In Advances in Cryptology ‐ CRYPTO'87 , 120 – 127 . Berlin : Springer‐Verlag .
  • Desmedt , Y. 1994 . “Threshold Cryptography,” . European Transactions on Telecommuni‐cations and Related Technologies , 5 ( 4 ) : 449 – 457 .
  • Desmedt , Y. and Frankel , Y. 1990 . “Threshold Cryptosystems,” . In Advances in Cryptology ‐CRYPTO'89 , 307 – 315 . Berlin : Springer‐Verlag .
  • Desmedt , Y. and Yung , M. 1992 . “Weaknesses of Undeniable Signature Schemes,” . In Advances in Cryptology ‐ EUROCRYPT'91 , 205 – 220 . Berlin : Springer‐Verlag .
  • Diffie , W. and Hellman , M.E. 1976 . “New Directions in Cryptography,” . IEEE Transactions on Information Theory , 22 ( 6 ) : 644 – 654 .
  • Harn , L. 1994 . “Group‐oriented (t, n) Threshold Digital Signature Scheme and Digital Multisignature,” . IEE Proceedings Computers and Digital Techniques , 141 ( 5 ) : 307 – 313 .
  • Harn , L. and Yang , S. 1993 . “Group‐oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party,” . In Advances in Cryptology ‐ AUSCRYPT'92 , 133 – 142 . Berlin : Springer‐Verlag .
  • Laih , C.S. and Harn , L. 1992 . “Generalized Threshold Cryptosystems,” . In Advances in Cryptology ‐AISACRYPTO'91 , 159 – 169 . Berlin : Springer‐Verlag .
  • Li , C.M. , Hwang , T. and Lee , N.Y. 1995 . “Threshold‐Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders,” . In Advances in Cryptology ‐EUROCRYPT'94 , 194 – 203 . Berlin : Springer‐Verlag .
  • Lin , C.H. , Wang , C.T. and Chang , C.C. 1996 . “A Group‐oriented (t, n) Undeniable Signature Scheme without Trusted Center,” . In The First Australasian Conference on Information Security and Privacy ‐ ACISP'96 , Edited by: Pieprzyk , J. and Seberry , J. 265 – 274 . Berlin : Springer‐Verlag .
  • Schneier , B. 1996 . Applied Cryptography, , Second Edition , John Wiley & Sons .
  • Schroeder , M.R. 1990 . Number Theory in Science and Communication, , Second Edition , Berlin : Springer‐Verlag .
  • Shamir , A. 1979 . “How to Share a Secret,” . Communications of the ACM , 22 ( 11 ) : 612 – 613 .
  • Correspondence addressee

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.