Optimization of the MOVA undeniable signature scheme

被引:0
|
作者
Monnerat, J [1 ]
Oswald, YA
Vaudenay, S
机构
[1] EPFL, Lausanne, Switzerland
[2] ETH, Zurich, Switzerland
来源
关键词
undeniable signatures; optimization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents optimization results on the MOVA undeniable signature scheme presented last year by Monnerat and Vaudenay at PKC '04 as well as its generalization proposed at Asiacrypt '04 which is based on a secret group homomorphism. The original MOVA scheme uses characters on Z(n)(*) and some additional candidate homomorphisms were proposed with its generalization. We give an overview of the expected performance of the MOVA scheme depending on the group homomorphism. Our optimizations focus on the quartic residue symbol and a homomorphism based on the computation of a discrete logarithm in a hidden subgroup of Z(n)(*). We demonstrate that the latter provides a signature generation which is three times faster than RSA.
引用
收藏
页码:196 / 209
页数:14
相关论文
共 50 条
  • [1] Convertible undeniable signature scheme
    Korea Univ, Seoul, Korea, Republic of
    Proc Conf High Perform Comput Inf Superhighway HPC Asia, (700-703):
  • [2] Convertible undeniable signature scheme
    Yun, SH
    Kim, TY
    HIGH PERFORMANCE COMPUTING ON THE INFORMATION SUPERHIGHWAY - HPC ASIA '97, PROCEEDINGS, 1997, : 700 - 703
  • [3] Certificateless undeniable signature scheme
    Duan, Shanshan
    INFORMATION SCIENCES, 2008, 178 (03) : 742 - 755
  • [4] Revocable anonymity of undeniable signature scheme
    Yeung, WKY
    Han, S
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 76 - 83
  • [5] Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    Yousef, Sufian
    Cole, Mike
    2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153
  • [6] The Insecurity of a Certificateless Undeniable Signature Scheme
    Behnia, Rouzbeh
    Heng, Swee-Huay
    2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2016, : 582 - 587
  • [7] A multivariate convertible undeniable signature scheme
    Omar, Satyam
    Padhye, Sahadeo
    Dey, Dhananjoy
    Mehrotra, Devansh
    INFORMATION AND COMPUTATION, 2025, 304
  • [8] An undeniable signature scheme based on lattice
    Li, S. (lishuang@th.btbu.edu.cn), 1600, Advanced Institute of Convergence Information Technology (04):
  • [9] An efficient certificateless undeniable signature scheme
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Gan, Che-Sheng
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2015, 92 (07) : 1313 - 1328
  • [10] User authentication scheme based on undeniable signature scheme
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (08): : 146 - 147