On the security of nominative signatures

被引:0
|
作者
Susilo, W [1 ]
Mu, Y [1 ]
机构
[1] Univ Wollongong, Sch Informat Technol & Comp Sci, Ctr Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
cryptography; digital signatures; nominative signatures; convertible; untransferable;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nominative signatures are the dual scheme of undeniable signatures, where only the nominee can verify the nominator (signer)'s signature and if necessary, only the nominee can prove to the third party that the signature issued to him (her) is valid. The first construction was proposed by Kim, Park and Won [7] and it was shown in the recent work of Huang and Wang in ACISP 2004 [51 that Kim-Park-Won's scheme does not satisfy the goal of nominative signatures. Moreover, Huang and Wang suggested a new nominative signature scheme in the same paper. They claimed that the new scheme satisfies all requirements of nominative signatures. In this paper, we show that Huang and Wang's scheme does not satisfy one important property of nominative signatures, namely the nominator (signer) can also verify the validity of the published signature. Moreover, we will show that the nominator can always show to anyone that the signature is indeed a valid signature without any cooperation from the nominee. Hence, the scheme is not nominative, since it does not satisfy the requirements of nominative signatures. Finally, we also discuss the security assumption that needs to be satisfied to obtain secure and efficient nominative signatures.
引用
收藏
页码:329 / 335
页数:7
相关论文
共 50 条
  • [1] Convertible nominative signatures
    Huang, ZJ
    Wang, YM
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 348 - 357
  • [2] Provably secure convertible nominative partially blind signatures
    Huang, ZJ
    Wang, YM
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1036 - 1042
  • [3] Security remarks on a convertible nominative signature scheme
    Wang, Guilin
    Bao, Feng
    [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 265 - +
  • [4] Pairing-Based Nominative Signatures with Selective and Universal Convertibility
    Zhao, Wei
    Ye, Dingfeng
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 60 - 74
  • [5] Security reconsideration of the Huang-Wang nominative signature
    Lin, Hsi-Chung
    Yen, Sung-Ming
    Huang, Yi-Hsiung
    [J]. INFORMATION SCIENCES, 2008, 178 (05) : 1407 - 1417
  • [6] Secure Single Sign-on Schemes Constructed from Nominative Signatures
    Wang, Jingquan
    Wang, Guilin
    Susilo, Willy
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 620 - 627
  • [7] Convertible Nominative Signatures from Standard Assumptions without Random Oracles
    Hanaoka, Goichiro
    Schuldt, Jacob
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (06) : 1107 - 1121
  • [8] The nominative puzzle and the low nominative hypothesis
    Sigurosson, Halldor Armann
    [J]. LINGUISTIC INQUIRY, 2006, 37 (02) : 289 - 308
  • [9] Security arguments for digital signatures and blind signatures
    Pointcheval, D
    Stern, J
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (03) : 361 - 396
  • [10] Security Arguments for Digital Signatures and Blind Signatures
    David Pointcheval
    Jacques Stern
    [J]. Journal of Cryptology, 2000, 13 : 361 - 396