RSA-Based Undeniable Signatures

被引:0
|
作者
Rosario Gennaro
Tal Rabin
Hugo Krawczyk
机构
[1] IBM T.J. Watson Research Center,
[2] PO Box 704,undefined
[3] Yorktown Heights,undefined
[4] NY 10598,undefined
[5] U.S.A. rosario@watson.ibm.com,undefined
[6] talr@watson.ibm.com ,undefined
[7] IBM T.J. Watson Research Center,undefined
[8] PO Box 704,undefined
[9] Yorktown Heights,undefined
[10] NY 10598,undefined
[11] U.S.A. and Department of Electrical Engineering,undefined
[12] Technion,undefined
[13] Haifa 32000,undefined
[14] Israel hugo@ee.technion.ac.il,undefined
来源
Journal of Cryptology | 2000年 / 13卷
关键词
Key words. Undeniable signatures, RSA, Zero-knowledge.;
D O I
暂无
中图分类号
学科分类号
摘要
We present the first undeniable signatures scheme based on RSA. Since their introduction in 1989 a significant amount of work has been devoted to the investigation of undeniable signatures. So far, this work has been based on discrete log systems. In contrast, our scheme uses regular RSA signatures to generate undeniable signatures. In this new setting, both the signature and verification exponents of RSA are kept secret by the signer, while the public key consists of a composite modulus and a sample RSA signature on a single public message.
引用
下载
收藏
页码:397 / 416
页数:19
相关论文
共 50 条
  • [31] An improved RSA-based access control scheme for hierarchical groups
    Cao, J
    Yao, ZA
    19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 719 - 723
  • [32] ANALYSIS OF HOMOMORPHIC PROPERTIES OF RSA-BASED CRYPTOSYSTEM FOR IMAGE SHARING
    Islam, Naveed
    Puech, William
    Hayat, Khizar
    Brouzet, Robert
    2010 IEEE 10TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS (ICSP2010), VOLS I-III, 2010, : 1825 - +
  • [33] A new RSA-based proxy re-encryption scheme
    Wang, Liangliang
    Chen, Kefei
    Long, Yu
    Mao, Xianping
    Journal of Computational Information Systems, 2015, 11 (02): : 567 - 575
  • [34] RSA-based Password-Authenticated Key Exchange, revisited
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1424 - 1438
  • [35] Retrofitting fairness on the original RSA-based E-cash
    Xu, SH
    Yung, MT
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 51 - 68
  • [36] Short Undeniable Signatures Based on Group Homomorphisms
    Monnerat, Jean
    Vaudenay, Serge
    JOURNAL OF CRYPTOLOGY, 2011, 24 (03) : 545 - 587
  • [37] Short Undeniable Signatures Based on Group Homomorphisms
    Jean Monnerat
    Serge Vaudenay
    Journal of Cryptology, 2011, 24 : 545 - 587
  • [38] Weakness in a RSA-based password authenticated key exchange protocol
    Youn, Taek-Young
    Park, Young-Ho
    Kim, Changhan
    Lim, Jongin
    INFORMATION PROCESSING LETTERS, 2008, 108 (06) : 339 - 342
  • [39] Some RSA-based encryption, schemes with tight security reduction
    Kurosawa, K
    Takagi, T
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 19 - 36
  • [40] Comment on traceability on RSA-based partially signature with low computation
    Wu, LC
    Yeh, YS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 1344 - 1348