Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles

被引:3
|
作者
Horng, Shi-Jinn [1 ,2 ]
Tzeng, Shiang-Feng [2 ]
Fan, Pingzhi [1 ]
Wang, Xian [1 ]
Li, Tianrui [1 ]
Khan, Muhammad Khurram [3 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 106, Taiwan
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11451, Saudi Arabia
基金
美国国家科学基金会;
关键词
Convertible; extended Euclidean algorithm; random oracle; undeniable signature;
D O I
10.3837/tiis.2013.06.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A convertible undeniable signature requires a verifier to interact with the signer to verify a signature and furthermore allows the signer to convert a valid one to publicly verifiable signature. In 2007, Yuen et al. proposed a convertible undeniable signature without random oracles in pairings. However, it is recently shown that Yuen et al.'s scheme is not invisible for the standard definition of invisibility. In this paper, we propose a new improvement by using extended Euclidean algorithm that can overcome the visibility attack. The proposed scheme has been evaluated based on computation and communication complexities and the performance comparisons of Yuen et al.'s scheme and various convertible undeniable signature schemes are provided. Moreover, it has been observed that the proposed algorithm reduces the computation and communication times significantly.
引用
收藏
页码:1512 / 1532
页数:21
相关论文
共 50 条
  • [1] Short and efficient convertible undeniable signature schemes without random oracles
    Huang, Qiong
    Wong, Duncan S.
    [J]. THEORETICAL COMPUTER SCIENCE, 2013, 476 : 67 - 83
  • [2] (Convertible) undeniable signatures without random oracles
    Yuen, Tsz Hon
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 83 - +
  • [3] Convertible undeniable signature scheme
    Yun, SH
    Kim, TY
    [J]. HIGH PERFORMANCE COMPUTING ON THE INFORMATION SUPERHIGHWAY - HPC ASIA '97, PROCEEDINGS, 1997, : 700 - 703
  • [4] The Convertible Undeniable Multi-Signature Scheme
    Yun, SungHyun
    Lee, Hyung-Woo
    Lee, MyungHo
    [J]. ADVANCES IN COGNITIVE NEURODYNAMICS, PROCEEDINGS, 2008, : 805 - +
  • [5] The efficient multipurpose convertible undeniable signature scheme
    Yun, SH
    Lee, HW
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 325 - 331
  • [6] Certificateless Signature Scheme without Random Oracles
    Yuan, Yumin
    Li, Da
    Tian, Liwen
    Zhu, Haishan
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 31 - 40
  • [7] Forward Secure Ring Signature without Random Oracles
    Liu, Joseph K.
    Yuen, Tsz Hon
    Zhou, Jianying
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 1 - +
  • [8] Improvement of a convertible undeniable partially blind signature scheme
    Han, Song
    Chang, Elizabeth
    Dillon, Tharam
    Wang, Jie
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 875 - +
  • [9] An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
    Schuldt, Jacob C. N.
    Matsuura, Kanta
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 276 - 293
  • [10] Verifiably encrypted signature scheme without random oracles
    Gorantla, MC
    Saxena, A
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 357 - 363