{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:26Z","timestamp":1750308206056,"version":"3.41.0"},"reference-count":9,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2004,10]]},"abstract":"<jats:p>The digital signature technique is a popular research branch in the field of contemporary cryptography because of its popularity in both economic and official applications. As more and more information gets processed digitally, digital signatures come to play a more and more important role. The prevention of the signature repudiation is therefore a basic requirement for digital signature techniques living up to. However, in some signature schemes, the validity of the signature is confirmed through some extra parameters or by certain trusted third parties. In 1999, Araki et al. proposed a scheme known for being convertible. In their scheme, certain verifiers can examine the signature without the help of the signers. Since then, many researchers have been devoted to the research and development of schemes with such a property. In this paper, we shall propose a new convertible group signature scheme. Our new scheme is based on two assumptions: the complexity of the discrete logarithm problem and the un-reversibility of the one-way hash function. In our discussion section later, we shall consider some possible attacks and prove that our new scheme is able to survive them. In addition, the special strength of our scheme is its efficient verification mechanism.<\/jats:p>","DOI":"10.1145\/1031154.1031160","type":"journal-article","created":{"date-parts":[[2005,1,26]],"date-time":"2005-01-26T16:49:14Z","timestamp":1106758154000},"page":"58-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A convertible group signature scheme"],"prefix":"10.1145","volume":"38","author":[{"given":"Chin-Chen","family":"Chang","sequence":"first","affiliation":[{"name":"National Chung Cheng University, Chaiyi, Taiwan"}]},{"given":"Yeu-Pong","family":"Lai","sequence":"additional","affiliation":[{"name":"National Chung Cheng University, Chaiyi, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2004,10]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"457","volume-title":"Proceedings of Advances in Cryptography - Crypto '91","author":"Desmedt Y.","year":"1991","unstructured":"Y. Desmedt and Y. Frankel , \" Shared generation of authentications and signatures \", Proceedings of Advances in Cryptography - Crypto '91 , Brighton, UK , pp. 457 -- 469 , 1991 . Y. Desmedt and Y. Frankel, \"Shared generation of authentications and signatures\", Proceedings of Advances in Cryptography - Crypto '91, Brighton, UK, pp. 457--469, 1991."},{"key":"e_1_2_1_2_1","first-page":"307","volume-title":"IEE Proceedings of Computers and Digital Techniques","author":"Harn L.","year":"1994","unstructured":"L. Harn , \"Group -oriented (t,n) threshold digital signature scheme and digital multisignature \", IEE Proceedings of Computers and Digital Techniques , pp. 307 -- 313 , 1994 . L. Harn, \"Group-oriented (t,n) threshold digital signature scheme and digital multisignature\", IEE Proceedings of Computers and Digital Techniques, pp. 307--313, 1994."},{"key":"e_1_2_1_3_1","first-page":"194","volume-title":"Proceedings of Advances in Cryptology - EuroCrypto '94","author":"Li C.","year":"1994","unstructured":"C. Li , T. Hwang , and N. Lee , \" Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders \", Proceedings of Advances in Cryptology - EuroCrypto '94 , Perugia, Italy , pp. 194 -- 204 , 1994 . C. Li, T. Hwang, and N. Lee, \"Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders\", Proceedings of Advances in Cryptology - EuroCrypto '94, Perugia, Italy, pp. 194--204, 1994."},{"key":"e_1_2_1_4_1","first-page":"133","volume-title":"Proceedings of Advances in Cryptography - Auscrypt '92","author":"Harn L.","year":"1992","unstructured":"L. Harn and S. Yang , \" Group-oriented undeniable signature schemes without the assistance of mutually trusted party \", Proceedings of Advances in Cryptography - Auscrypt '92 , Gold Coast, Queensland , pp. 133 -- 142 , 1992 . L. Harn and S. Yang, \"Group-oriented undeniable signature schemes without the assistance of mutually trusted party\", Proceedings of Advances in Cryptography - Auscrypt '92, Gold Coast, Queensland, pp. 133--142, 1992."},{"doi-asserted-by":"publisher","key":"e_1_2_1_5_1","DOI":"10.1016\/S0140-3664(02)00049-X"},{"doi-asserted-by":"publisher","key":"e_1_2_1_6_1","DOI":"10.1016\/S0140-3664(99)00031-6"},{"key":"e_1_2_1_7_1","series-title":"Lecture Notes in Computer Science- Information and Communications Security (ICICS","first-page":"382","volume-title":"An efficient convertible authenticated encryption scheme and its variant","author":"Huang H. F.","year":"2003","unstructured":"H. F. Huang and C. C. Chang , \" An efficient convertible authenticated encryption scheme and its variant \", Lecture Notes in Computer Science- Information and Communications Security (ICICS 2003 ). (S. Qing, D. Gollmann, J. Zhou Eds.), Springer Verlag , Germany, pp. 382 -- 392 , 2003. H. F. Huang and C. C. Chang, \"An efficient convertible authenticated encryption scheme and its variant\", Lecture Notes in Computer Science- Information and Communications Security (ICICS 2003). (S. Qing, D. Gollmann, J. Zhou Eds.), Springer Verlag, Germany, pp. 382--392, 2003."},{"key":"e_1_2_1_8_1","first-page":"63","article-title":"The limited verifier signature and its application","volume":"82","author":"Araki S.","year":"1999","unstructured":"S. Araki , S. Uehara , and Imamura K ., \" The limited verifier signature and its application \", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences , vol. E82 -A, pp. 63 -- 68 , 1999 . S. Araki, S. Uehara, and Imamura K., \"The limited verifier signature and its application\", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E82-A, pp. 63--68, 1999.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.1016\/S0164-1212(01)00143-1"}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1031154.1031160","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1031154.1031160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:30:56Z","timestamp":1750264256000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1031154.1031160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10]]},"references-count":9,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2004,10]]}},"alternative-id":["10.1145\/1031154.1031160"],"URL":"https:\/\/doi.org\/10.1145\/1031154.1031160","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[2004,10]]},"assertion":[{"value":"2004-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}