Improvement of a convertible undeniable partially blind signature scheme

被引:0
|
作者
Han, Song [1 ]
Chang, Elizabeth [1 ]
Dillon, Tharam [2 ]
Wang, Jie [3 ]
机构
[1] Curtin Univ Technol, Sch Informat Syst, Curtin Business Sch, GPO Box U 1987, Perth, WA 6845, Australia
[2] Univ Technol Sydney, Fac Informat Technol, Sydney, NSW 2007, Australia
[3] Natl Nat Sci Fdn, Beijing, Peoples R China
关键词
partially blind signature; undeniable signature; blind signature; security protocol; convertible undeniable signature;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Undeniable signatures are the digital signatures that should be verified with the help of the signer A signer may disavow a genuine document, if the signature is only verifiable with the aid of the signer under the condition that the signer is not honest. Undeniable signatures solve this problem by adding a new feature called the disavowal protocol in addition to the normal components of signature and verification. Disavowal protocol is able to prevent a dishonest signer from disavowing a valid signature. In some situations, an undeniable signature should be converted into a normal digital signature in order that the signature can be universally verified. Blind signatures the digital signatures that help a user to get a signature on a message without revealing the content of the message to a signer For the blind signatures, if the signer is able to make an agreement with the user then the underlying signer may include some common information that is known to the user, then such signatures are partially blind signatures. Convertible undeniable partially blind signatures are of the features of undeniable signatures, blind signatures, convertible undeniable signatures, and partially blind signatures. Recently, a convertible undeniable partially blind signature scheme was presented. In this paper we first analyze a security flaw of the convertible undeniable partially blind signature scheme. To address the security flaw, we present an improvement on the disavowal protocol. The improved scheme can prevent the signer from either proving that a given valid signature as invalid, or cheating the verifier.
引用
收藏
页码:875 / +
页数:3
相关论文
共 50 条
  • [1] Convertible Undeniable Partially Blind Signature from Bilinear Pairings
    Koide, Atsushi
    Tso, Raylin
    Okamoto, Eiji
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 77 - +
  • [2] Convertible undeniable signature scheme
    Korea Univ, Seoul, Korea, Republic of
    [J]. Proc Conf High Perform Comput Inf Superhighway HPC Asia, (700-703):
  • [3] Convertible undeniable signature scheme
    Yun, SH
    Kim, TY
    [J]. HIGH PERFORMANCE COMPUTING ON THE INFORMATION SUPERHIGHWAY - HPC ASIA '97, PROCEEDINGS, 1997, : 700 - 703
  • [4] Convertible undeniable partially blind signatures
    Huang, ZJ
    Chen, ZX
    Wang, YM
    [J]. 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 609 - 614
  • [5] The efficient multipurpose convertible undeniable signature scheme
    Yun, SH
    Lee, HW
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 325 - 331
  • [6] The Convertible Undeniable Multi-Signature Scheme
    Yun, SungHyun
    Lee, Hyung-Woo
    Lee, MyungHo
    [J]. ADVANCES IN COGNITIVE NEURODYNAMICS, PROCEEDINGS, 2008, : 805 - +
  • [7] An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
    Schuldt, Jacob C. N.
    Matsuura, Kanta
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 276 - 293
  • [8] New convertible undeniable signature scheme's and attack models
    Kobayashi, Y
    Nagata, H
    Saito, T
    Tsujii, S
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS III, 2002, : 107 - 112
  • [9] Convertible and selectively convertible undeniable signature schemes
    Kazarin, OV
    [J]. AUTOMATION AND REMOTE CONTROL, 1998, 59 (06) : 897 - 904
  • [10] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    [J]. PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477