## Directed Threshold Multi-Signature Scheme without SDC

Citations: | 1 - 0 self |

### BibTeX

@MISC{Lal_directedthreshold,

author = {Sunder Lal and Manoj Kumar},

title = {Directed Threshold Multi-Signature Scheme without SDC},

year = {}

}

### OpenURL

### Abstract

In this paper, we propose a Directed threshold multisignature scheme without SDC. This signature scheme is applicable when the message is sensitive to the signature receiver; and the signatures are generated by the cooperation of a number of people from a given group of senders. In this scheme, any malicious set of signers cannot impersonate any other set of signers to forge the signatures. In case of forgery, it is possible to trace the signing set.

### Citations

2728 | New Directions in Cryptography - Diffie, Hellman - 1976 |

1773 | How to share a secret - Shamir - 1979 |

585 | Efficient Signature Generation by Smart Cards - Schnorr - 1991 |

493 |
Undeniable Signatures
- Chaum, Antwerpen
- 1990
(Show Context)
Citation Context ...o the signature receiver. Signatures on medical records, tax information and most personal/business transactions are such situations. Signatures used in such situations are called directed signatures =-=[1, 2, 3, 14, 15, 19, 23, 24]-=-. In directed signature scheme, the signature receiver has full control over the signature verification process and can prove the validity of the signature to any third party, whenever necessary. Nobo... |

199 | A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory - Guillou, Quisquater - 1988 |

123 | Robust Threshold DSS Signatures
- Krawczyk, Rabin
- 1996
(Show Context)
Citation Context ...igner, but this solution increases the effort to verify the message linearly with the number of signer. To solve this problems, Multisignature schemes [10,11,13,17,18] and threshold signature schemes =-=[5,6,7,9,12,20]-=- are used where more than one signers share the responsibility of signing messages Threshold signatures are closely related to the concept of threshold cryptography, first introduced by Desmedt [5, 6,... |

102 |
Shared Generation of Authentication and Signatures
- Desmedt, Frankel
- 1992
(Show Context)
Citation Context ...igner, but this solution increases the effort to verify the message linearly with the number of signer. To solve this problems, Multisignature schemes [10,11,13,17,18] and threshold signature schemes =-=[5,6,7,9,12,20]-=- are used where more than one signers share the responsibility of signing messages Threshold signatures are closely related to the concept of threshold cryptography, first introduced by Desmedt [5, 6,... |

98 |
Society and group oriented cryptography: A new concept
- Desmedt
- 1987
(Show Context)
Citation Context ...igner, but this solution increases the effort to verify the message linearly with the number of signer. To solve this problems, Multisignature schemes [10,11,13,17,18] and threshold signature schemes =-=[5,6,7,9,12,20]-=- are used where more than one signers share the responsibility of signing messages Threshold signatures are closely related to the concept of threshold cryptography, first introduced by Desmedt [5, 6,... |

93 |
Threshold cryptography
- Desmedt
- 1994
(Show Context)
Citation Context |

83 | A Simplified Approach to Threshold and Proactive RSA
- Rabin
- 1998
(Show Context)
Citation Context |

81 |
Designated Confirmer Signatures
- Chaum
- 1995
(Show Context)
Citation Context ...o the signature receiver. Signatures on medical records, tax information and most personal/business transactions are such situations. Signatures used in such situations are called directed signatures =-=[1, 2, 3, 14, 15, 19, 23, 24]-=-. In directed signature scheme, the signature receiver has full control over the signature verification process and can prove the validity of the signature to any third party, whenever necessary. Nobo... |

62 |
Convertible Undeniable Signatures
- Boyar, Chaum, et al.
- 1991
(Show Context)
Citation Context ...o the signature receiver. Signatures on medical records, tax information and most personal/business transactions are such situations. Signatures used in such situations are called directed signatures =-=[1, 2, 3, 14, 15, 19, 23, 24]-=-. In directed signature scheme, the signature receiver has full control over the signature verification process and can prove the validity of the signature to any third party, whenever necessary. Nobo... |

33 |
Designated Confirmer Signatures and Public Key Encryption Are Equivalent,” CRYPTO
- Okamoto
- 1994
(Show Context)
Citation Context |

31 |
A digital multisignature scheme using bijective public-key cryptosystems
- Okamoto
- 1988
(Show Context)
Citation Context ...a separate digital signature for every required signer, but this solution increases the effort to verify the message linearly with the number of signer. To solve this problems, Multisignature schemes =-=[10,11,13,17,18]-=- and threshold signature schemes [5,6,7,9,12,20] are used where more than one signers share the responsibility of signing messages Threshold signatures are closely related to the concept of threshold ... |

27 |
K.A public key cryptosystem suitable for digital multi-signature[J].NEC Res and Develop
- Itakura, Nakamura
- 1983
(Show Context)
Citation Context ...a separate digital signature for every required signer, but this solution increases the effort to verify the message linearly with the number of signer. To solve this problems, Multisignature schemes =-=[10,11,13,17,18]-=- and threshold signature schemes [5,6,7,9,12,20] are used where more than one signers share the responsibility of signing messages Threshold signatures are closely related to the concept of threshold ... |

22 |
A digital multisignature scheme based on the Fiat-Shamir scheme”, Asiacrypt 91
- Ohta, Okamoto
- 1991
(Show Context)
Citation Context ...a separate digital signature for every required signer, but this solution increases the effort to verify the message linearly with the number of signer. To solve this problems, Multisignature schemes =-=[10,11,13,17,18]-=- and threshold signature schemes [5,6,7,9,12,20] are used where more than one signers share the responsibility of signing messages Threshold signatures are closely related to the concept of threshold ... |

20 | Computing Logarithms in Finite Fields of Characteristic Two - Blake, Fuji-Hara, et al. - 1984 |

19 | Modified Maurer-Yacobi‘s scheme and its applications
- LIM, LEE
- 1993
(Show Context)
Citation Context |

17 |
New digital signature scheme based on discrete logarithm
- Yen, Laih
- 1993
(Show Context)
Citation Context |

10 | A practical digital multisignature scheme bansed on discrete logarithms
- Hardjono, Zheng
- 1993
(Show Context)
Citation Context |

5 |
A directed signature scheme and its applications
- Lal, Kumar
- 2003
(Show Context)
Citation Context |

4 |
Security Protocol
- Lim, Lee
- 1996
(Show Context)
Citation Context |

4 | Structural properties of one – way hash functions - Zheng, Matsummoto, et al. - 1990 |

3 |
n) Threshold signature scheme and digital multisignature”, Workshop on cryptography and Data security
- Harn
(Show Context)
Citation Context |

2 |
New Scheme for Digital Multisignatures.Electronic Letters. 25(15
- Harn, Kiesler
- 1989
(Show Context)
Citation Context |