(t, n) threshold untraceable signatures

Narn Yih Lee, Tzone-Lih Hwang, Chuan Ming Li

Research output: Contribution to journalArticle

9 Citations (Scopus)

Abstract

A (t, n) threshold signature scheme is one which enables any t or more shareholders to cooperatively generate a group signature. Based on the traceability of the signers, threshold signatures can further be classified into (1) threshold traceable signatures, where the identities of the signers, who generate the signature, can be traced by the system; and (2) threshold untraceable signatures, where the signers of a signature cannot be traced. This paper distinguishes the applications of threshold signatures of both types and also proposes a threshold untraceable signature scheme. The new signature scheme can be augmented to give the original signers the ability to prove that they are the true signers.

Original languageEnglish
Pages (from-to)835-846
Number of pages12
JournalJournal of Information Science and Engineering
Volume16
Issue number6
Publication statusPublished - 2000 Nov 1

Fingerprint

Shareholders
shareholder
ability
Group

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Hardware and Architecture
  • Library and Information Sciences
  • Computational Theory and Mathematics

Cite this

Lee, Narn Yih ; Hwang, Tzone-Lih ; Li, Chuan Ming. / (t, n) threshold untraceable signatures. In: Journal of Information Science and Engineering. 2000 ; Vol. 16, No. 6. pp. 835-846.
@article{f475f1a22edb42ab8927a1b6047cbfbb,
title = "(t, n) threshold untraceable signatures",
abstract = "A (t, n) threshold signature scheme is one which enables any t or more shareholders to cooperatively generate a group signature. Based on the traceability of the signers, threshold signatures can further be classified into (1) threshold traceable signatures, where the identities of the signers, who generate the signature, can be traced by the system; and (2) threshold untraceable signatures, where the signers of a signature cannot be traced. This paper distinguishes the applications of threshold signatures of both types and also proposes a threshold untraceable signature scheme. The new signature scheme can be augmented to give the original signers the ability to prove that they are the true signers.",
author = "Lee, {Narn Yih} and Tzone-Lih Hwang and Li, {Chuan Ming}",
year = "2000",
month = "11",
day = "1",
language = "English",
volume = "16",
pages = "835--846",
journal = "Journal of Information Science and Engineering",
issn = "1016-2364",
publisher = "Institute of Information Science",
number = "6",

}

(t, n) threshold untraceable signatures. / Lee, Narn Yih; Hwang, Tzone-Lih; Li, Chuan Ming.

In: Journal of Information Science and Engineering, Vol. 16, No. 6, 01.11.2000, p. 835-846.

Research output: Contribution to journalArticle

TY - JOUR

T1 - (t, n) threshold untraceable signatures

AU - Lee, Narn Yih

AU - Hwang, Tzone-Lih

AU - Li, Chuan Ming

PY - 2000/11/1

Y1 - 2000/11/1

N2 - A (t, n) threshold signature scheme is one which enables any t or more shareholders to cooperatively generate a group signature. Based on the traceability of the signers, threshold signatures can further be classified into (1) threshold traceable signatures, where the identities of the signers, who generate the signature, can be traced by the system; and (2) threshold untraceable signatures, where the signers of a signature cannot be traced. This paper distinguishes the applications of threshold signatures of both types and also proposes a threshold untraceable signature scheme. The new signature scheme can be augmented to give the original signers the ability to prove that they are the true signers.

AB - A (t, n) threshold signature scheme is one which enables any t or more shareholders to cooperatively generate a group signature. Based on the traceability of the signers, threshold signatures can further be classified into (1) threshold traceable signatures, where the identities of the signers, who generate the signature, can be traced by the system; and (2) threshold untraceable signatures, where the signers of a signature cannot be traced. This paper distinguishes the applications of threshold signatures of both types and also proposes a threshold untraceable signature scheme. The new signature scheme can be augmented to give the original signers the ability to prove that they are the true signers.

UR - http://www.scopus.com/inward/record.url?scp=0034317142&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0034317142&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:0034317142

VL - 16

SP - 835

EP - 846

JO - Journal of Information Science and Engineering

JF - Journal of Information Science and Engineering

SN - 1016-2364

IS - 6

ER -