Browse > Article
http://dx.doi.org/10.13089/JKIISC.2002.12.6.81

Digital Signature Schemes with Restriction on Signing Capability  

황정연 (고려대학교 정보보호 대학원)
이동훈 (고려대학교 정보보호 대학원)
임종인 (고려대학교 정보보호 대학원)
Abstract
In some practical circumstances, the ability of a signer should be restricted. In group signature schemes, a group member of a group may be allowed to generate signatures up to a certain number of times according to his/her position in the group. In proxy signature schemes, an original signer may want to allow a proxy signer to generate a certain number of signatures on behalf of the original signer. In the paper, we present signature schemes, called c-times signature schemes, that restrict the signing ability of a signer up to c times for pre-defined value c at set-up. The notion of c-times signature schemes are formally defined, and generic transformation from a signature scheme to a c-times signature scheme is suggested. The proposed scheme has a self-enforcement property such that if a signer generates c+1 or more signatures, his/her signature is forged. As a specific example, we present a secure c-times signature scheme $^c$DSA based on the DSA (Digital Signature Algorithm) by using a threshold scheme. Our transformation can be applied to other ElGamal-like signature schemes as well.
Keywords
Digital Signature Scheme; Threshold Scheme; Verifiable Secret Sharing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Algorithms for multi-exponentiation /
[ B. Moller ] / SAC2001, Lecture Notes in Computer Science
2 Efficient identification and signatures for smart cards /
[ C. P. Schnorr ] / Crypto'89, Lecture Notes in Computer Science
3 Threshold DSS signatures without trusted party /
[ S. Langford ] / Crypto'95 Lecture Notes in Computer Science
4 How to Share a Secret /
[ A. Shamir ] / Communications of the ACM
5 Constructing digital signatures from a one-way function /
[ L. Lamport ] / Technical Report SRI Intl. CSL 98
6 Society and group oriented crytography: A new concept /
[ Y. Desmedt ] / Crypto'87, Lecture Notes in Computer Science
7 /
[ National Institute for Standard and Technology ] / Digital Signature Standard(DSS) Technical Report 169
8 New directions in Cryptgraphy /
[ W. Diffie;M.E. Hellman ] / IEEE Trans. Info. Theory
9 A method for obtaining digital signatures and public-key cryptosystem /
[ R. L. Rivest;A. Shamir;L. Adleman ] / communications of the ACM   DOI   ScienceOn
10 Verifiable secret sharing and achieving simultanity in the presence of faults /
[ B. Chor;S. Goldwasser;S. Micali;B. Awerbuch ] / Proceedings of 26th IEEE Symposium on the Foundations of Computer Science(FOCS)
11 Proxy signature /
[ M. Mambo;K. Usuda;E. Okamoto ] / Proceedings of the 1995 Symposium on Cryptography and Information Security
12 Directed acyclic graphs, one-way functions and digital signatures /
[ D. Bleichenbacher;U. M. mauer ] / Crypto'94, Lecture Notes in Computer Science
13 Digital Multisignayures /
[ C. Boyd.;H. Baker(ed.);F. Piper(ed.) ] / Cryptography and Coding
14 A Practical Scheme Non-Interactive Verifiable Secret Sharing /
[ P. Feldman ] / Proc. 28th IEEE Symp. on Foundations of Comp. Science
15 Threshold cryptosystem /
[ Y. Desmedt;Y. Frankel ] / Crypto'89, Lecture Notes in Computer Science
16 A digital signature scheme secure against adaptive chosen-message attacks /
[ S. Goldwasser;S. Micali;R. Rivest ] / SIAM Journal of Computing   DOI   ScienceOn
17 Group Signatures /
[ D. Chum ] / Advances in Cryptology-EUROCRYPT'91 Proceeding
18 A public key cryptosystem and a signature scheme based on discrete logarithms /
[ T. ElGamal ] / IEEE Trans. Info. Theory