DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Xiaofeng | ko |
dc.contributor.author | Zhang, Fangguo | ko |
dc.contributor.author | Tian, Haibo | ko |
dc.contributor.author | Wei, Baodian | ko |
dc.contributor.author | Susilo, Willy | ko |
dc.contributor.author | Mu, Yi | ko |
dc.contributor.author | Lee, Hyunrok | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2009-12-28T06:41:04Z | - |
dc.date.available | 2009-12-28T06:41:04Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2008-11 | - |
dc.identifier.citation | INFORMATION SCIENCES, v.178, no.21, pp.4192 - 4203 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | http://hdl.handle.net/10203/15890 | - |
dc.description.abstract | The "hash-sign-switch" paradigm was firstly proposed by Shamir and Tauman with the aim to design an efficient on-line/off-line signature scheme. Nonetheless, all existing on-line/off-line signature schemes based on this paradigm suffer from the key exposure problem of chameleon hashing. To avoid this problem, the signer should pre-compute and store a plenty of different chameleon hash values and the corresponding signatures on the hash values in the off-line phase, and send the collision and the signature for a certain hash value in the on-line phase. Hence, the computation and storage cost for the off-line phase and the communication cost for t0he on-line phase in Shamir-Tauman's signature scheme are still a little more overload. In this paper, we first introduce a special double-trapdoor hash family based on the discrete logarithm assumption and then incorporate it to construct a more efficient generic on-line/off-line signature scheme without key exposure. Furthermore, we also present the first key-exposure-free generic on-line/off-line threshold signature scheme without a trusted dealer. Additionally, we prove that the proposed schemes have achieved the desired security requirements. (C) 2008 Elsevier Inc. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.subject | RANDOM ORACLES | - |
dc.subject | DISCRETE LOGARITHMS | - |
dc.subject | DIGITAL-SIGNATURES | - |
dc.subject | SCHEME | - |
dc.subject | SECURE | - |
dc.subject | CRYPTOSYSTEMS | - |
dc.subject | ATTACKS | - |
dc.title | Efficient generic on-line/off-line (threshold) signatures without key exposure | - |
dc.type | Article | - |
dc.identifier.wosid | 000259485900015 | - |
dc.identifier.scopusid | 2-s2.0-49849102704 | - |
dc.type.rims | ART | - |
dc.citation.volume | 178 | - |
dc.citation.issue | 21 | - |
dc.citation.beginningpage | 4192 | - |
dc.citation.endingpage | 4203 | - |
dc.citation.publicationname | INFORMATION SCIENCES | - |
dc.identifier.doi | 10.1016/j.ins.2008.06.022 | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Chen, Xiaofeng | - |
dc.contributor.nonIdAuthor | Zhang, Fangguo | - |
dc.contributor.nonIdAuthor | Tian, Haibo | - |
dc.contributor.nonIdAuthor | Wei, Baodian | - |
dc.contributor.nonIdAuthor | Susilo, Willy | - |
dc.contributor.nonIdAuthor | Mu, Yi | - |
dc.contributor.nonIdAuthor | Lee, Hyunrok | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | on-line/off-line | - |
dc.subject.keywordAuthor | threshold signatures | - |
dc.subject.keywordAuthor | double-trapdoor | - |
dc.subject.keywordAuthor | chameleon hashing | - |
dc.subject.keywordAuthor | key exposure problem | - |
dc.subject.keywordPlus | RANDOM ORACLES | - |
dc.subject.keywordPlus | DISCRETE LOGARITHMS | - |
dc.subject.keywordPlus | DIGITAL-SIGNATURES | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordPlus | SECURE | - |
dc.subject.keywordPlus | CRYPTOSYSTEMS | - |
dc.subject.keywordPlus | ATTACKS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.