English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113318/144297 (79%)
Visitors : 50955646      Online Users : 985
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/140661
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/140661


    Title: 新式具欺騙者偵測之不可否認(t,n)-門檻策略簽章
    A Novel Undeniable (t, n)-Threshold Signature with Cheater Identification
    Authors: 林彥賓
    Lin, Yan-Bin
    Contributors: 曾一凡
    Tseng, Yi-Fan
    林彥賓
    Lin, Yan-Bin
    Keywords: (t, n)-門檻策略
    不可否認簽章
    欺騙者偵測
    零知識證明
    (t, n)-threshold
    Undeniable signature
    Cheater identification
    Zero knowledge proof
    Date: 2022
    Issue Date: 2022-07-01 16:21:09 (UTC+8)
    Abstract: (t, n)-門檻策略簽章中,n人的群組中只要有t人參與,即可順利簽章,不可否認的特性讓群組來決定誰可以驗證此簽章的合法性,但此方案在交互過程中出錯一般都無法找出是t個人中的誰蓄意破壞,此論文有以下貢獻:
    • 展示如何欺騙過 TzuohYi Lin 與 TzongChen Wu 的具欺騙者偵測的 (t, n)-門檻策略不可否認簽章方法而不被偵測
    • 第一個證明滿足不可偽造與隱密性的 (t, n)-門檻策略不可否認簽章方案
    • 方案出錯時,可以偵測出欺騙者
    • 不須任何可信任第三方或安全密碼模型
    (t, n)-threshold signature, as long as t people in the group of n people participate, the signature can be smoothly signed. The undeniable feature allows the group to determine who can verify the validity of the signature. In the process
    of interaction, if the program makes mistakes, it is generally impossible to find out who among the t people deliberately sabotaged. This paper has the following
    contributions:
    • Demonstrate how to deceive TzuohYi Lin and TzongChen Wu’s undeniable (t, n)-threshold signature with cheater identification without being detected
    • The first undeniable (t, n)-threshold signature that proves it meets unforgeability and invisibility
    • The cheater can be detected when the proposol scheme goes wrong
    • Does not require any trusted third party or secure cryptographic mode
    Reference: [1] David Chaum. 1990. Zero­knowledge undeniable signatures. In Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 458–464.
    [2] David Chaum and Torben Pryds Pedersen. 1992. Wallet databases with observers. In Annual international cryptology conference. Springer, 89–105.
    [3] David Chaum and Hans Van Antwerpen. 1989. Undeniable signatures. In Conference on the Theory and Application of Cryptology. Springer, 212–216.
    [4] Giovanni Di Crescenzo, Jonathan Katz, Rafail Ostrovsky, and Adam Smith. 2001. Efficient and non­interactive non­malleable commitment. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 40–59.
    [5] Ivan Damgard and Jens Groth. 2003. Non­interactive and reusable non­malleable commitment schemes. In Proceedings of the thirty­fifth annual ACM symposium on Theory of computing. 426–437.
    [6] Ivan Damgård and Torben Pedersen. 1996. New convertible undeniable signature schemes.
    In International Conference on the Theory and Applications of Cryptographic Techniques.
    Springer, 372–386.
    [7] Yvo G Desmedt. 1994. Threshold cryptography. European Transactions on Telecommunications 5, 4 (1994), 449–458.
    [8] Giovanni Di Crescenzo, Yuval Ishai, and Rafail Ostrovsky. 1998. Non­interactive and nonmalleable commitment. In Proceedings of the thirtieth annual ACM symposium on Theory of computing. 141–150. [9] Danny Dolev, Cynthia Dwork, and Moni Naor. 2003. Nonmalleable cryptography. SIAM review 45, 4 (2003), 727–784.
    [10] Shanshan Duan. 2008. Certificateless undeniable signature scheme. Information Sciences 178, 3 (2008), 742–755.
    [11] Paul Feldman. 1987. A practical scheme for non­interactive verifiable secret sharing. In 28th Annual Symposium on Foundations of Computer Science (sfcs 1987). IEEE, 427–438.
    [12] Steven D Galbraith and Wenbo Mao. 2003. Invisibility and anonymity of undeniable and confirmer signatures. In Cryptographers’Track at the RSA Conference. Springer, 80–97.
    [13] Rosario Gennaro. 2004. Multi­trapdoor commitments and their applications to proofs of knowledge secure under concurrent man­in­the­middle attacks. In Annual International Cryptology Conference. Springer, 220–236.
    [14] Lein Harn and Shoubao Yang. 1992. Group­oriented undeniable signature schemes without the assistance of a mutually trusted party. In International Workshop on the Theory and Application of Cryptographic Techniques. Springer, 133–142.
    [15] Shin­Jia Hwang, Hao­Chih Liao, et al. 2006. A Group­Oriented Undeniable Signature Scheme for Unlikely Signers and Verifiers. Journal of Applied Science and Engineering 9, 1 (2006), 45–54.
    [16] Yuval Ishai, Rafail Ostrovsky, and Vassilis Zikas. 2014. Secure multi­party computation with identifiable abort. In Annual Cryptology Conference. Springer, 369–386.
    [17] Markus Jakobsson, Kazue Sako, and Russell Impagliazzo. 1996. Designated verifier proofs and their applications. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 143–154.
    [18] Kaoru Kurosawa and Jun Furukawa. 2008. Universally composable undeniable signature.
    In International Colloquium on Automata, Languages, and Programming. Springer, 524– 535.
    [19] Kaoru Kurosawa and Swee­Huay Heng. 2005. 3­move undeniable signature scheme.
    In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 181–197. [20] N­Y Lee and Tzonelih Hwang. 1999. Group­oriented undeniable signature schemes with a trusted center. Computer Communications 22, 8 (1999), 730–734.
    [21] Yong Li, Willy Susilo, Yi Mu, and Dingyi Pei. 2007. Designated verifier signature: definition, framework and new constructions. In International Conference on Ubiquitous Intelligence and Computing. Springer, 1191–1200.
    [22] Chu­Hsing Lin, Ching­Te Wang, and Chin­Chen Chang. 1996. A group­oriented (t, n) undeniable signature scheme without trusted center. In Australasian Conference on Information Security and Privacy. Springer, 266–274.
    [23] Tzuoh­Yi Lin and Tzong­Chen Wu. 1998. Undeniable (t, n)­threshold signature scheme with cheater identification. Journal of the Chinese Institute of Engineers 21, 6 (1998), 775–780.
    [24] Yan­Bin Lin and Yi­Fan Tsengg. 2021. Cryptanalysis on Lin and Wu’s Undeniable (t, n)­ Threshold Signature Scheme with Cheater Identification. In 2021 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS). IEEE, 1–2.
    [25] Helger Lipmaa, Guilin Wang, and Feng Bao. 2005. Designated verifier signature schemes: Attacks, new security notions and a new construction. In International Colloquium on Automata, Languages, and Programming. Springer, 459–471.
    [26] Yu Liu and Tong Liu. 2019. A novel threshold signature scheme based on elliptic curve with designated verifier. In International Conference on Artificial Intelligence and Security. Springer, 332–342.
    [27] Philip MacKenzie and Ke Yang. 2004. On simulation­sound trapdoor commitments. In International Conference on the Theory and Applications of Cryptographic Techniques.
    Springer, 382–400.
    [28] Markus Michels and Markus Stadler. 1997. Efficient convertible undeniable signature schemes. In Proc. of 4th annual workshop on selected areas in cryptography (SAC’97).
    231–244. [29] Wakaha Ogata, Kaoru Kurosawa, and Swee­Huay Heng. 2005. The security of the FDH variant of Chaum’s undeniable signature scheme. In International Workshop on Public Key Cryptography. Springer, 328–345.
    [30] David Pointcheval and Jacques Stern. 1996. Security proofs for signature schemes. In International Conference on the Theory and Applications of Cryptographic Techniques.
    Springer, 387–398.
    [31] Swati Rawal, Sahadeo Padhye, and Debiao He. 2022. Lattice­based undeniable signature scheme. Annals of Telecommunications (2022), 1–8.
    [32] Shahrokh Saeednia, Steve Kremer, and Olivier Markowitch. 2003. An efficient strong designated verifier signature scheme. In International conference on information security and cryptology. Springer, 40–54.
    [33] Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612–613.
    [34] Victor Shoup. 2000. Practical threshold signatures. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 207–220.
    [35] Ron Steinfeld, Laurence Bull, Huaxiong Wang, and Josef Pieprzyk. 2003. Universal designated­verifier signatures. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 523–542.
    [36] Guilin Wang, Sihan Qing, Mingsheng Wang, and Zhanfei Zhou. 2001. Threshold undeniable RSA signature scheme. In International Conference on Information and Communications Security. Springer, 221–232.
    [37] Gui­lin Wang and Si­han Qing. 2002. A threshold undeniable signature scheme without a trusted party. Journal of Software 13, 9 (2002), 1758–1764.
    Description: 碩士
    國立政治大學
    資訊科學系
    109753111
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0109753111
    Data Type: thesis
    DOI: 10.6814/NCCU202200498
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    311101.pdf1257KbAdobe PDF270View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback