The efficient multipurpose convertible undeniable signature scheme

被引:0
|
作者
Yun, SH
Lee, HW
机构
[1] Cheonan Univ, Div Informat & Commun Engn, Cheonan 330704, South Korea
[2] Hanshin Univ, Dept Software, Osan 447791, Gyunggi, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The digital signature can be verified and disavowed only with cooperation of the signer in undeniable signature scheme. A signed confidential document of a company can be copied and delivered to a rival company. If a conventional signature scheme is used to sign the document, it can be confirmed as authentic by verifying the signature without the signer's cooperation. However, if the company doesn't want the document to be verified as authentic by the rival company, it is recommended to use the undeniable signature scheme. Convertible undeniable signature scheme has additional property that the signer can convert undeniable signature to the ordinary one. The document signed by undeniable signature scheme that is no longer confidential can be opened to public use by converting the signature to the ordinary one. In this study, the efficient multipurpose convertible undeniable signature scheme based on El-Gamal signature scheme is proposed. The proposed scheme satisfies undeniable property and can convert undeniable signature to the ordinary one. The number of public keys and signatures are less than those of Boyar's convertible signature scheme[4]. It also reduces the number of communication steps of the signature confirmation protocol.
引用
收藏
页码:325 / 331
页数:7
相关论文
共 50 条
  • [31] The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits
    SungHyun Yun
    Heuiseok Lim
    Young-Sik Jeong
    SoonYoung Jung
    Jae-Khun Chang
    [J]. Wireless Personal Communications, 2011, 60 : 405 - 418
  • [32] New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
    Phong, Le Trieu
    Kurosawa, Kaoru
    Ogata, Wakaha
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 63 - 75
  • [33] A convertible group signature scheme
    Chang, Chin-Chen
    Lai, Yeu-Pong
    [J]. Operating Systems Review (ACM), 2004, 38 (04): : 58 - 65
  • [34] Provably secure pairing-based convertible undeniable signature with short signature length
    Huang, Xinyi
    Mu, Yi
    Susilo, Willy
    Wu, Wei
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2007, 2007, 4575 : 367 - +
  • [35] User authentication scheme based on undeniable signature scheme
    [J]. Jisuanji Gongcheng/Computer Engineering, 2000, 26 (08): : 146 - 147
  • [36] New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
    Phong, Le Trieu
    Kurosawa, Kaoru
    Ogata, Wakaha
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 116 - +
  • [37] CONVERTIBLE UNDENIABLE SIGNATURES
    BOYAR, J
    CHAUM, D
    DAMGARD, I
    PEDERSEN, T
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 537 : 189 - 205
  • [38] Secure Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 63 - 68
  • [39] 3-Move undeniable signature scheme
    Kurosawa, K
    Heng, SH
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 181 - 197
  • [40] Undeniable multiple grade proxy signature scheme
    Cai, Mian
    Kang, Li
    [J]. Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2006, 32 (10): : 952 - 957