Efficient generic on-line/off-line (threshold) signatures without key exposure

Cited 41 time in webofscience Cited 49 time in scopus
  • Hit : 483
  • Download : 255
DC FieldValueLanguage
dc.contributor.authorChen, Xiaofengko
dc.contributor.authorZhang, Fangguoko
dc.contributor.authorTian, Haiboko
dc.contributor.authorWei, Baodianko
dc.contributor.authorSusilo, Willyko
dc.contributor.authorMu, Yiko
dc.contributor.authorLee, Hyunrokko
dc.contributor.authorKim, Kwangjoko
dc.date.accessioned2009-12-28T06:41:04Z-
dc.date.available2009-12-28T06:41:04Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2008-11-
dc.identifier.citationINFORMATION SCIENCES, v.178, no.21, pp.4192 - 4203-
dc.identifier.issn0020-0255-
dc.identifier.urihttp://hdl.handle.net/10203/15890-
dc.description.abstractThe "hash-sign-switch" paradigm was firstly proposed by Shamir and Tauman with the aim to design an efficient on-line/off-line signature scheme. Nonetheless, all existing on-line/off-line signature schemes based on this paradigm suffer from the key exposure problem of chameleon hashing. To avoid this problem, the signer should pre-compute and store a plenty of different chameleon hash values and the corresponding signatures on the hash values in the off-line phase, and send the collision and the signature for a certain hash value in the on-line phase. Hence, the computation and storage cost for the off-line phase and the communication cost for t0he on-line phase in Shamir-Tauman's signature scheme are still a little more overload. In this paper, we first introduce a special double-trapdoor hash family based on the discrete logarithm assumption and then incorporate it to construct a more efficient generic on-line/off-line signature scheme without key exposure. Furthermore, we also present the first key-exposure-free generic on-line/off-line threshold signature scheme without a trusted dealer. Additionally, we prove that the proposed schemes have achieved the desired security requirements. (C) 2008 Elsevier Inc. All rights reserved.-
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherELSEVIER SCIENCE INC-
dc.subjectRANDOM ORACLES-
dc.subjectDISCRETE LOGARITHMS-
dc.subjectDIGITAL-SIGNATURES-
dc.subjectSCHEME-
dc.subjectSECURE-
dc.subjectCRYPTOSYSTEMS-
dc.subjectATTACKS-
dc.titleEfficient generic on-line/off-line (threshold) signatures without key exposure-
dc.typeArticle-
dc.identifier.wosid000259485900015-
dc.identifier.scopusid2-s2.0-49849102704-
dc.type.rimsART-
dc.citation.volume178-
dc.citation.issue21-
dc.citation.beginningpage4192-
dc.citation.endingpage4203-
dc.citation.publicationnameINFORMATION SCIENCES-
dc.identifier.doi10.1016/j.ins.2008.06.022-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorChen, Xiaofeng-
dc.contributor.nonIdAuthorZhang, Fangguo-
dc.contributor.nonIdAuthorTian, Haibo-
dc.contributor.nonIdAuthorWei, Baodian-
dc.contributor.nonIdAuthorSusilo, Willy-
dc.contributor.nonIdAuthorMu, Yi-
dc.contributor.nonIdAuthorLee, Hyunrok-
dc.type.journalArticleArticle-
dc.subject.keywordAuthoron-line/off-line-
dc.subject.keywordAuthorthreshold signatures-
dc.subject.keywordAuthordouble-trapdoor-
dc.subject.keywordAuthorchameleon hashing-
dc.subject.keywordAuthorkey exposure problem-
dc.subject.keywordPlusRANDOM ORACLES-
dc.subject.keywordPlusDISCRETE LOGARITHMS-
dc.subject.keywordPlusDIGITAL-SIGNATURES-
dc.subject.keywordPlusSCHEME-
dc.subject.keywordPlusSECURE-
dc.subject.keywordPlusCRYPTOSYSTEMS-
dc.subject.keywordPlusATTACKS-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 41 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0