INTERACTIVE BI-PROOF SYSTEMS AND UNDENIABLE SIGNATURE SCHEMES

被引:0
|
作者
FUJIOKA, A
OKAMOTO, T
OHTA, K
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper proposes a new construction of the minimum knowledge undeniable signature scheme which solves a problem inherent in Chaum's scheme. We formulate a new proof system, the minimum knowledge interactive bi-proof system, and a pair of languages, the common witness problem, based on the random self-reducible problem. And we show that any common witness problem has the minimum knowledge interactive biproof system. A practical construction for undeniable signature schemes is proposed based on such a proof system. These schemes assure signature confirmation and disavowal with the same protocol (or at the same time).
引用
收藏
页码:243 / 256
页数:14
相关论文
共 50 条
  • [1] INTERACTIVE BI-PROOF SYSTEMS AND UNDENIABLE SIGNATURE SCHEMES
    FUJIOKA, A
    OKAMOTO, T
    OHTA, K
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1992, E75D (01) : 102 - 109
  • [2] WEAKNESSES OF UNDENIABLE SIGNATURE SCHEMES
    DESMEDT, Y
    YUNG, MT
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 205 - 220
  • [3] Applications of Undeniable Signature Schemes
    Yeow, Kin-Woon
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Behnia, Rouzbeh
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING APPLICATIONS (ICSIPA), 2015, : 133 - 138
  • [4] New convertible undeniable signature schemes
    Damgard, I
    Pedersen, T
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 372 - 386
  • [5] Convertible and selectively convertible undeniable signature schemes
    Kazarin, OV
    [J]. AUTOMATION AND REMOTE CONTROL, 1998, 59 (06) : 897 - 904
  • [6] A Note on the Invisibility and Anonymity of Undeniable Signature Schemes
    Loh, Jia-Ch'ng
    Heng, Swee-Huay
    Tan, Syh-Yuan
    Kurosawa, Kaoru
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 112 - 125
  • [7] Relations among security notions for undeniable signature schemes
    Kurosawa, Kaoru
    Heng, Swee-Huay
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 34 - 48
  • [8] Notes on Two Flawed Attacks on Undeniable Signature Schemes
    Behnia, Rouzbeh
    Heng, Swee-Huay
    [J]. 2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [9] New approach for selectively convertible undeniable signature schemes
    Kurosawa, Kaoru
    Takagi, Tsuyoshi
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 428 - 443
  • [10] On the Security of Pairing-Based Non-Interactive Designated Verifier Proofs of Undeniable Signature Schemes
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Gan, Che-Sheng
    [J]. 2012 IEEE CONFERENCE ON SUSTAINABLE UTILIZATION AND DEVELOPMENT IN ENGINEERING AND TECHNOLOGY (STUDENT), 2012, : 207 - 212