<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">inf18403</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2007.192</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Chang</surname>
						<given-names>Ya-Fen</given-names>
					</name>
					<email xlink:href="mailto:cyf@cs.ccu.edu.tw">cyf@cs.ccu.edu.tw</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Chang</surname>
						<given-names>Chin-Chen</given-names>
					</name>
					<email xlink:href="mailto:ccc@cs.ccu.edu.tw">ccc@cs.ccu.edu.tw</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_002"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Lin</surname>
						<given-names>Pei-Yu</given-names>
					</name>
					<email xlink:href="mailto:lpy91@cs.ccu.edu.tw">lpy91@cs.ccu.edu.tw</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_002"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">Department of Computer Science and Information Engineering, National Taichung Institute of Technology, Taichung 404, Taiwan, R.O.C.</aff>
				<aff id="j_INFORMATICA_aff_001">Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan, R.O.C.</aff>
				<aff id="j_INFORMATICA_aff_002">Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi 621, Taiwan, R.O.C.</aff>
			</contrib-group>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2007</year>
			</pub-date>
			<volume>18</volume>
			<issue>4</issue>
			<fpage>535</fpage>
			<lpage>546</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>07</month>
					<year>2005</year>
				</date>
			</history>
			<abstract>
				<p>In 2004, Abe et al. proposed a threshold signer-ambiguous signature scheme from variety of keys. Their scheme is a generalized case of the ring signature scheme, and it allows the key types to be based on the trapdoor one-way permutations (TOWP) or sigma-protocols including Schnorr's signature scheme. However, the signed message is public for all, which may result in disputes. In this paper, we present a novel threshold signer-ambiguous signature scheme, having the signed message concealed and keeping who the receivers are secret from variety of keys.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>trapdoor one-way permutation</kwd>
				<kwd>digital signature</kwd>
				<kwd>signer-ambiguous signature</kwd>
				<kwd>ring signature</kwd>
				<kwd>Schnorr's signature scheme</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>