Relations among security notions for undeniable signature schemes

被引:0
|
作者
Kurosawa, Kaoru
Heng, Swee-Huay
机构
[1] Univ Ibadan, Dept Comp & Informat Sci, Hitachi, Ibaraki 3168511, Japan
[2] Multimedia Univ, Fac Informat Sci & Technol, Ctr Cryptog & Informat Secur, Jalan Ayer Keroh Lama 75450, Melaka, Malaysia
关键词
undeniable signature; security notions; factoring assumption; composite decision Diffie-Hellman assumption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we conduct a thorough study among various notions of security of undeniable signature schemes and establish some relationships among them. We focus on two adversarial goals which are unforgeability and invisibility and two attacks which are chosen message attack and full attack. In particular,we show that unforgeability against chosen message attack is equivalent to unforgeability against full attack, and invisibility against chosen message attack is equivalent to invisibility against full attack. We also present an undeniable signature scheme whose unforgeability is based on the factoring assumption and whose invisibility is based on the composite decision Diffie-Hellman assumption.
引用
收藏
页码:34 / 48
页数:15
相关论文
共 50 条
  • [1] Security notions for stateful signature schemes
    Yuan, Quan
    Tibouchi, Mehdi
    Abe, Masayuki
    [J]. IET INFORMATION SECURITY, 2021, 16 (01) : 1 - 17
  • [2] Relations among notions of security for identity based encryption schemes
    Attrapadung, N
    Cui, Y
    Galindo, D
    Hanaoka, G
    Hasuo, I
    Imai, H
    Matsuura, K
    Yang, P
    Zhang, R
    [J]. LATIN 2006: THEORETICAL INFORMATICS, 2006, 3887 : 130 - 141
  • [3] Security notions for unconditionally secure signature schemes
    Shikata, J
    Hanaoka, G
    Zheng, YL
    Imai, H
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 434 - 449
  • [4] Relations among notions of security for public-key encryption schemes
    Bellare, M
    Desai, A
    Pointcheval, D
    Rogaway, P
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 26 - 45
  • [5] Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
    Cui, Yang
    Fujisaki, Eiichiro
    Hanaoka, Goichiro
    Imai, Hideki
    Zhang, Rui
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 53 - 66
  • [6] WEAKNESSES OF UNDENIABLE SIGNATURE SCHEMES
    DESMEDT, Y
    YUNG, MT
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 205 - 220
  • [7] Applications of Undeniable Signature Schemes
    Yeow, Kin-Woon
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Behnia, Rouzbeh
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING APPLICATIONS (ICSIPA), 2015, : 133 - 138
  • [8] New convertible undeniable signature schemes
    Damgard, I
    Pedersen, T
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 372 - 386
  • [9] On the security of the Lee-Hwang group-oriented undeniable signature schemes
    Wang, GL
    Zhou, JY
    Deng, RH
    [J]. TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 289 - 298
  • [10] Convertible and selectively convertible undeniable signature schemes
    Kazarin, OV
    [J]. AUTOMATION AND REMOTE CONTROL, 1998, 59 (06) : 897 - 904