Advanced Search
Volume 30 Issue 4
Dec.  2010
Turn off MathJax
Article Contents
Wang Xiao-feng, Lin Ting-ting, Wang Shang-ping, Zhang Ya-ling. Limited Confederate Verifier Signatures[J]. Journal of Electronics & Information Technology, 2008, 30(4): 991-994. doi: 10.3724/SP.J.1146.2006.01507
Citation: Wang Xiao-feng, Lin Ting-ting, Wang Shang-ping, Zhang Ya-ling. Limited Confederate Verifier Signatures[J]. Journal of Electronics & Information Technology, 2008, 30(4): 991-994. doi: 10.3724/SP.J.1146.2006.01507

Limited Confederate Verifier Signatures

doi: 10.3724/SP.J.1146.2006.01507
  • Received Date: 2006-10-09
  • Rev Recd Date: 2007-05-15
  • Publish Date: 2008-04-19
  • The precise definition and security model of a new signature scheme-limited confederate verifier signatures is proposed based on the idea of threshold. An efficient limited confederate verifier signatures scheme is also constructed for the first time. The new scheme allows confining the right to learn the message and the right to verify the signature within t verifiers, the signature can be verified iff all the t verifiers cooperate. Moreover, the size of the signature does not grow with the number of verifiers. The scheme is proved to achieve the desired security request under the random oracle model.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3045) PDF downloads(707) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return