On the security of nominative signatures

被引:0
|
作者
Susilo, W [1 ]
Mu, Y [1 ]
机构
[1] Univ Wollongong, Sch Informat Technol & Comp Sci, Ctr Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
cryptography; digital signatures; nominative signatures; convertible; untransferable;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nominative signatures are the dual scheme of undeniable signatures, where only the nominee can verify the nominator (signer)'s signature and if necessary, only the nominee can prove to the third party that the signature issued to him (her) is valid. The first construction was proposed by Kim, Park and Won [7] and it was shown in the recent work of Huang and Wang in ACISP 2004 [51 that Kim-Park-Won's scheme does not satisfy the goal of nominative signatures. Moreover, Huang and Wang suggested a new nominative signature scheme in the same paper. They claimed that the new scheme satisfies all requirements of nominative signatures. In this paper, we show that Huang and Wang's scheme does not satisfy one important property of nominative signatures, namely the nominator (signer) can also verify the validity of the published signature. Moreover, we will show that the nominator can always show to anyone that the signature is indeed a valid signature without any cooperation from the nominee. Hence, the scheme is not nominative, since it does not satisfy the requirements of nominative signatures. Finally, we also discuss the security assumption that needs to be satisfied to obtain secure and efficient nominative signatures.
引用
收藏
页码:329 / 335
页数:7
相关论文
共 50 条
  • [21] Security mediated certificateless signatures
    Yap, Nvun-She
    Chow, Sherman S. M.
    Heng, Swee-Huay
    Goi, Bok-Min
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 459 - +
  • [22] Stronger Security for Sanitizable Signatures
    Krenn, Stephan
    Samelin, Kai
    Sommer, Dieter
    DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 100 - 117
  • [23] Nominative case
    Clegg, Brian
    NEW SCIENTIST, 2012, 214 (2859) : 33 - 33
  • [24] The 'nominative absolute'
    Emmons, J
    DESCANT, 2005, 36 (03): : 59 - 60
  • [25] NOMINATIVE FOR ACCUSATIVE
    Householder, Fred W., Jr.
    WORD-JOURNAL OF THE INTERNATIONAL LINGUISTIC ASSOCIATION, 1949, 5 (02): : 202 - 204
  • [26] Extraction Security of Sequential Aggregate Signatures
    Zhai Jiaqi
    Liu Jian
    Chen Lusheng
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (05) : 885 - 894
  • [27] Lattice Blind Signatures with Forward Security
    Le, Huy Quoc
    Duong, Dung Hoang
    Susilo, Willy
    Tran, Ha Thanh Nguyen
    Trinh, Viet Cuong
    Pieprzyk, Josef
    Plantard, Thomas
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 3 - 22
  • [28] On Tight Security Proofs for Schnorr Signatures
    Nils Fleischhacker
    Tibor Jager
    Dominique Schröder
    Journal of Cryptology, 2019, 32 : 566 - 599
  • [29] Security of self-certified signatures
    Shao, Zuhua
    INFORMATION PROCESSING LETTERS, 2009, 109 (20) : 1147 - 1150
  • [30] SOME VARIATIONS ON RSA SIGNATURES AND THEIR SECURITY
    DEJONGE, W
    CHAUM, D
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 49 - 59