directed signature
Recently Published Documents


TOTAL DOCUMENTS

15
(FIVE YEARS 3)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Weiping Zuo

Directed signature is introduced when the signed message contains privacy which is sensitive to the receiver, it is widely used in some special occasions involving signature privacy, such as electronic bidding, electronic voting, personal business activities, etc. This paper presents a new directed proxy multi-signature scheme, which integrated the directed signature and proxy multi-signature. In the proposed scheme, the agent generate a signature on behalf of the delegators, only a receiver specified by the delegator convince whether the truth of signature or not. At last, we analyze the characteristics and discuss the security of the scheme.


2019 ◽  
Vol 13 (05) ◽  
pp. 2050098
Author(s):  
Mohd Saiful Adli Mohamad

Directed signature is a type of function-based signature with the property that the signature only can be verified by a designated verifier and at certain times, the verifier should be able to convince anyone about the validity of the signature without revealing any secret information about the signature to the public. Taking into consideration the involvement of group decision making, some threshold directed signature schemes based on single number theoretic problems, such as integer factorization, discrete logarithm problem, and elliptic curve discrete logarithm problem, have been developed by cryptographers. Although the single-problem-based schemes are still invincible because there is still no cryptanalyst to find the solution to the problems, in the future, if the enemy or attacker manages to get the polynomial algorithm to solve the single problems, the schemes will no longer be practiced and applied. For such reason, in this paper, we propose a new threshold-directed signature scheme based on integer factorization and discrete logarithm problems. The advantage of our scheme is based on the assumption that it is very unlikely to solve two hard number theoretic problems simultaneously. We also show that our scheme is secured against some cryptographic attacks and also significantly efficient compared with threshold signature scheme based on single problem.


2014 ◽  
Vol 275 ◽  
pp. 284-292 ◽  
Author(s):  
Jung Yeon Hwang ◽  
Hyoung Joong Kim ◽  
Dong Hoon Lee ◽  
Boyeon Song

2013 ◽  
Vol 7 ◽  
pp. 6217-6225 ◽  
Author(s):  
N. N. Ramlee ◽  
E. S. Ismail

Sign in / Sign up

Export Citation Format

Share Document