|
|
Limited Confederate Verifier Signatures |
Wang Xiao-feng①; Lin Ting-ting①②; Wang Shang-ping①; Zhang Ya-ling① |
①School of Sciences, Xi’an University of Technology, Xi’an 710054, China;②School of Sciences, Southwest University of Science and Technology, Mianyang 621010, China |
|
|
Abstract The precise definition and security model of a new signature scheme-limited confederate verifier signatures is proposed based on the idea of threshold. An efficient limited confederate verifier signatures scheme is also constructed for the first time. The new scheme allows confining the right to learn the message and the right to verify the signature within t verifiers, the signature can be verified iff all the t verifiers cooperate. Moreover, the size of the signature does not grow with the number of verifiers. The scheme is proved to achieve the desired security request under the random oracle model.
|
Received: 09 October 2006
|
|
|
|
|
|
|
|