An Efficient Construction of Convertible Undeniable Proxy Signatures

被引:1
|
作者
Wu, Wei [1 ,2 ]
Mu, Yi [1 ,3 ]
Susilo, Willy [3 ]
Huang, Xinyi [1 ,2 ]
Xu, Li [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Shaanxi, Peoples R China
[3] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
来源
JOURNAL OF INTERNET TECHNOLOGY | 2014年 / 15卷 / 03期
基金
中国国家自然科学基金;
关键词
Undeniable signatures; Proxy signatures; Convertible; Security models; Security proof; SECURE; SCHEME; SIGN;
D O I
10.6138/JIT.2014.15.3.16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/Disavowal protocol with the help of the signer. Convertible undeniable signatures provide the flexibility that a signer can convert an undeniable signatures into publicly verifiable one. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former when the former is not available. Proxy signatures have found numerous practical applications in ubiquitous computing, distributed systems, mobile agent applications, etc. In this paper, we propose the first convertible undeniable proxy signature scheme with rigorously proven security. The properties Unforgeability, Invisibility and Soundness in the context of convertible undeniable proxy signatures are also clearly defined. The security of our construction is formally proven in the random oracle models, based on some natural complexity assumptions.
引用
收藏
页码:471 / 484
页数:14
相关论文
共 50 条
  • [1] Convertible undeniable proxy signatures: Security models and efficient construction
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Huang, Xinyi
    [J]. INFORMATION SECURITY APPLICATIONS, 2007, 4867 : 16 - 29
  • [2] An Efficient Construction of Time-Selective Convertible Undeniable Signatures
    Huang, Qiong
    Wong, Duncan S.
    Susilo, Willy
    Yang, Bo
    [J]. INFORMATION SECURITY, 2011, 7001 : 355 - +
  • [3] Efficient Convertible Undeniable Signatures with Delegatable Verification
    Schuldt, Jacob C. N.
    Matsuura, Kanta
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 71 - 83
  • [4] CONVERTIBLE UNDENIABLE SIGNATURES
    BOYAR, J
    CHAUM, D
    DAMGARD, I
    PEDERSEN, T
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 537 : 189 - 205
  • [5] A generic construction for universally-convertible undeniable signatures
    Huang, Xinyi
    Mu, Yi
    Susilo, Willy
    Wu, Wei
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 15 - 33
  • [6] Convertible group undeniable signatures
    Lyuu, YD
    Wu, ML
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 48 - 61
  • [7] Gradually convertible undeniable signatures - (Michels-Petersen-Horster convertible undeniable signatures revisited)
    El Aimani, Laila
    Vergnaud, Damien
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 478 - +
  • [8] A Framework for Constructing Convertible Undeniable Signatures
    Kikuchi, Ryo
    Phong, Le Trieu
    Ogata, Wakaha
    [J]. PROVABLE SECURITY, 2010, 6402 : 70 - +
  • [9] Convertible undeniable partially blind signatures
    Huang, ZJ
    Chen, ZX
    Wang, YM
    [J]. 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 609 - 614
  • [10] Convertible undeniable standards RSA signatures
    Mao, Wenbo
    Paterson, Kenneth G.
    [J]. HP Laboratories Technical Report, 2000, (148):