CRYPTOGRAPHICALLY STRONG UNDENIABLE SIGNATURES, UNCONDITIONALLY SECURE FOR THE SIGNER

被引:0
|
作者
CHAUM, D [1 ]
VANHEIJST, E [1 ]
PFITZMANN, B [1 ]
机构
[1] UNIV HILDESHEIM, INST INFORMAT, W-3200 HILDESHEIM, GERMANY
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present the first undeniable signature schemes where signers are unconditionally secure. In the efficient variants, the security for the recipients relies on a discrete logarithm assumption or on factoring; and in a theoretical version, on claw-free permutation pairs. Besides, on the one hand, the efficient variants are the first practical cryptographically strong undeniable signature schemes at all. On the other hand, in many cases they are more efficient than previous signature schemes unconditionally secure for the signer. Interesting new subprotocols are efficient collision-free hash functions based on a discrete logarithm assumption, efficient perfectly hiding commitments for elements of Z(p) (p prime), and fairly practical perfect zero-knowledge proofs for arithmetic formulas in Z(p) or Z2sigma.
引用
收藏
页码:470 / 484
页数:15
相关论文
共 50 条
  • [1] Unconditionally Secure Quantum Signatures
    Amiri, Ryan
    Andersson, Erika
    [J]. ENTROPY, 2015, 17 (08): : 5635 - 5659
  • [2] Unconditionally Secure Group Signatures
    Seito, Takenobu
    Hara, Yuki
    Shikata, Junji
    Matsumoto, Tsutomu
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (08) : 2067 - 2085
  • [3] Unconditionally Secure Blind Signatures
    Hara, Yuki
    Seito, Takenobu
    Shikata, Junji
    Matsumoto, Tsutomu
    [J]. INFORMATION THEORETIC SECURITY, 2009, 4883 : 23 - 43
  • [4] Provably Secure Convertible Undeniable Signatures with Unambiguity
    Le Trieu Phong
    Kurosawa, Kaoru
    Ogata, Wakaha
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 291 - 308
  • [5] Efficient unconditionally secure digital signatures
    Hanaoka, G
    Shikata, J
    Zheng, YL
    Imai, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (01) : 120 - 130
  • [6] UNCONDITIONALLY-SECURE DIGITAL-SIGNATURES
    CHAUM, D
    ROIJAKKERS, S
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 537 : 206 - 214
  • [7] Unconditionally secure signatures and its related schemes
    Hanaoka, G
    [J]. 2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, 2005, : 7 - 12
  • [8] Unconditionally secure encryption under strong attacks
    McAven, L
    Safavi-Naini, R
    Yung, M
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 427 - 439
  • [9] UNDENIABLE SIGNATURES
    CHAUM, D
    VANANTWERPEN, H
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 212 - 216
  • [10] A secure strong proxy signature scheme with proxy signer privacy protection
    Lee, Youn-Ho
    Hong, Seong-Min
    Yoon, Hyunsoo
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 33 - 38