Relations among security notions for undeniable signature schemes

被引:0
|
作者
Kurosawa, Kaoru
Heng, Swee-Huay
机构
[1] Univ Ibadan, Dept Comp & Informat Sci, Hitachi, Ibaraki 3168511, Japan
[2] Multimedia Univ, Fac Informat Sci & Technol, Ctr Cryptog & Informat Secur, Jalan Ayer Keroh Lama 75450, Melaka, Malaysia
关键词
undeniable signature; security notions; factoring assumption; composite decision Diffie-Hellman assumption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we conduct a thorough study among various notions of security of undeniable signature schemes and establish some relationships among them. We focus on two adversarial goals which are unforgeability and invisibility and two attacks which are chosen message attack and full attack. In particular,we show that unforgeability against chosen message attack is equivalent to unforgeability against full attack, and invisibility against chosen message attack is equivalent to invisibility against full attack. We also present an undeniable signature scheme whose unforgeability is based on the factoring assumption and whose invisibility is based on the composite decision Diffie-Hellman assumption.
引用
收藏
页码:34 / 48
页数:15
相关论文
共 50 条
  • [41] Online encryption schemes: New security notions and constructions
    Boldyreva, A
    Taesombut, N
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 1 - 14
  • [42] Provable security of proxy signature schemes
    Gu, CX
    Zhu, YF
    [J]. ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063
  • [43] Boosting the Security of Blind Signature Schemes
    Katz, Jonathan
    Loss, Julian
    Rosenberg, Michael
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT IV, 2021, 13093 : 468 - 492
  • [44] The security of the birational permutation signature schemes
    Coppersmith, D
    Stern, J
    Vaudenay, S
    [J]. JOURNAL OF CRYPTOLOGY, 1997, 10 (03) : 207 - 221
  • [45] THE SECURITY OF HE AND KIESLERS SIGNATURE SCHEMES
    LEE, NY
    HWANG, T
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 370 - 372
  • [46] A Survey on Security of Certificateless Signature Schemes
    Chen, Yu-Chi
    Tso, Raylin
    [J]. IETE TECHNICAL REVIEW, 2016, 33 (02) : 115 - 121
  • [47] On the Security of Some Aggregate Signature Schemes
    Kang, Baoyuan
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2012,
  • [48] The security of the birational permutation signature schemes
    Don Coppersmith
    Jacques Stern
    Serge Vaudenay
    [J]. Journal of Cryptology, 1997, 10 : 207 - 221
  • [49] Extended security arguments for signature schemes
    Dagdelen, Ozgur
    Galindo, David
    Veron, Pascal
    Alaoui, Sidi Mohamed El Yousfi
    Cayrel, Pierre-Louis
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2016, 78 (02) : 441 - 461
  • [50] On the security of arbitrated quantum signature schemes
    Li, Qin
    Li, Chengqing
    Wen, Zhonghua
    Zhao, Weizhong
    Chan, Wai Hong
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2013, 46 (01)