Applications of Undeniable Signature Schemes

被引:0
|
作者
Yeow, Kin-Woon [1 ]
Tan, Syh-Yuan [1 ]
Heng, Swee-Huay [1 ]
Behnia, Rouzbeh [1 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol, Jalan Ayer Keroh Lama, Melaka 75450, Malaysia
关键词
CASH;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Online applications such as e-auction, e-voting, and e-cash require common security properties such as integrity, unforgeability, confidentiality, non-repudiation, authentication, and anonymity. In this paper, besides identifying the security properties needed by these three applications, we also discuss the importance of access control. We show that undeniable signature schemes and its variants fulfil the security requirements and access control needed by the applications. We also propose a generic method to combine an undeniable signature scheme with a trapdoor function for constructing the applications mentioned above.
引用
收藏
页码:133 / 138
页数:6
相关论文
共 50 条
  • [1] WEAKNESSES OF UNDENIABLE SIGNATURE SCHEMES
    DESMEDT, Y
    YUNG, MT
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 205 - 220
  • [2] Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications
    Hu, Xiaoming
    Tan, Wenan
    Xu, Huajie
    Wang, Jian
    Ma, Chuang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017, : 1 - 9
  • [3] New convertible undeniable signature schemes
    Damgard, I
    Pedersen, T
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 372 - 386
  • [4] Convertible and selectively convertible undeniable signature schemes
    Kazarin, OV
    [J]. AUTOMATION AND REMOTE CONTROL, 1998, 59 (06) : 897 - 904
  • [5] A Note on the Invisibility and Anonymity of Undeniable Signature Schemes
    Loh, Jia-Ch'ng
    Heng, Swee-Huay
    Tan, Syh-Yuan
    Kurosawa, Kaoru
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 112 - 125
  • [6] Relations among security notions for undeniable signature schemes
    Kurosawa, Kaoru
    Heng, Swee-Huay
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 34 - 48
  • [7] Notes on Two Flawed Attacks on Undeniable Signature Schemes
    Behnia, Rouzbeh
    Heng, Swee-Huay
    [J]. 2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [8] New approach for selectively convertible undeniable signature schemes
    Kurosawa, Kaoru
    Takagi, Tsuyoshi
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 428 - 443
  • [9] INTERACTIVE BI-PROOF SYSTEMS AND UNDENIABLE SIGNATURE SCHEMES
    FUJIOKA, A
    OKAMOTO, T
    OHTA, K
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1992, E75D (01) : 102 - 109
  • [10] INTERACTIVE BI-PROOF SYSTEMS AND UNDENIABLE SIGNATURE SCHEMES
    FUJIOKA, A
    OKAMOTO, T
    OHTA, K
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 243 - 256