RSA-Based Undeniable Signatures

被引:0
|
作者
Rosario Gennaro
Tal Rabin
Hugo Krawczyk
机构
[1] IBM T.J. Watson Research Center,
[2] PO Box 704,undefined
[3] Yorktown Heights,undefined
[4] NY 10598,undefined
[5] U.S.A. rosario@watson.ibm.com,undefined
[6] talr@watson.ibm.com ,undefined
[7] IBM T.J. Watson Research Center,undefined
[8] PO Box 704,undefined
[9] Yorktown Heights,undefined
[10] NY 10598,undefined
[11] U.S.A. and Department of Electrical Engineering,undefined
[12] Technion,undefined
[13] Haifa 32000,undefined
[14] Israel hugo@ee.technion.ac.il,undefined
来源
Journal of Cryptology | 2000年 / 13卷
关键词
Key words. Undeniable signatures, RSA, Zero-knowledge.;
D O I
暂无
中图分类号
学科分类号
摘要
We present the first undeniable signatures scheme based on RSA. Since their introduction in 1989 a significant amount of work has been devoted to the investigation of undeniable signatures. So far, this work has been based on discrete log systems. In contrast, our scheme uses regular RSA signatures to generate undeniable signatures. In this new setting, both the signature and verification exponents of RSA are kept secret by the signer, while the public key consists of a composite modulus and a sample RSA signature on a single public message.
引用
收藏
页码:397 / 416
页数:19
相关论文
共 50 条
  • [11] A New RSA-Based Signature Scheme
    Schaege, Sven
    Schwenk, Joerg
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 1 - 15
  • [12] Identity based undeniable signatures
    Libert, B
    Quisquater, JJ
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 112 - 125
  • [13] RSA-Based Handshake protocol in Internet of Things
    Mao, Junye
    Zhu, Huiying
    Liu, Yulan
    Liu, Yuanjing
    Qian, Weihao
    Zhang, Jie
    Huang, Xin
    2018 NINTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME 2018), 2018, : 989 - 993
  • [14] On the security of a RSA-based certificateless signature scheme
    He, Debiao
    Khan, Muhammad Khurram
    Wu, Shuhua
    International Journal of Network Security, 2014, 16 (01) : 78 - 80
  • [15] On the Efficiency of Revocation in RSA-Based Anonymous Systems
    Fueyo, Maria
    Herranz, Javier
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1782 - 1790
  • [16] RSA-Based Certificateless Public Key Encryption
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Kou, Weidong
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 24 - +
  • [17] RSA-based auto-recoverable cryptosystems
    Young, A
    Yung, M
    PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 326 - 341
  • [18] Attacking RSA-based sessions in SSL/TLS
    Klíma, V
    Pokorny, O
    Rosa, T
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 426 - 440
  • [19] An efficient RSA-based certificateless signature scheme
    Zhang, Jianhong
    Mao, Jane
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (03) : 638 - 642
  • [20] RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery
    Nenadic, Aleksandra
    Zhang, Ning
    Shi, Qi
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (05) : 757 - 777