RSA-Based Undeniable Signatures

被引:0
|
作者
Rosario Gennaro
Tal Rabin
Hugo Krawczyk
机构
[1] IBM T.J. Watson Research Center,
[2] PO Box 704,undefined
[3] Yorktown Heights,undefined
[4] NY 10598,undefined
[5] U.S.A. rosario@watson.ibm.com,undefined
[6] talr@watson.ibm.com ,undefined
[7] IBM T.J. Watson Research Center,undefined
[8] PO Box 704,undefined
[9] Yorktown Heights,undefined
[10] NY 10598,undefined
[11] U.S.A. and Department of Electrical Engineering,undefined
[12] Technion,undefined
[13] Haifa 32000,undefined
[14] Israel hugo@ee.technion.ac.il,undefined
来源
Journal of Cryptology | 2000年 / 13卷
关键词
Key words. Undeniable signatures, RSA, Zero-knowledge.;
D O I
暂无
中图分类号
学科分类号
摘要
We present the first undeniable signatures scheme based on RSA. Since their introduction in 1989 a significant amount of work has been devoted to the investigation of undeniable signatures. So far, this work has been based on discrete log systems. In contrast, our scheme uses regular RSA signatures to generate undeniable signatures. In this new setting, both the signature and verification exponents of RSA are kept secret by the signer, while the public key consists of a composite modulus and a sample RSA signature on a single public message.
引用
下载
收藏
页码:397 / 416
页数:19
相关论文
共 50 条
  • [41] Multi-objective evolutionary hardware for RSA-based cryptosystems
    Nedjah, N
    Mourelle, LD
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 503 - 507
  • [42] A complete and explicit security reduction algorithm for RSA-based cryptosystems
    Kurosawa, K
    Schmidt-Samoa, K
    Takagi, T
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 474 - 491
  • [43] Undeniable and Unpretendable Signatures
    Le Trieu Phong
    Kurosawa, Kaoru
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 138 - 150
  • [44] CONVERTIBLE UNDENIABLE SIGNATURES
    BOYAR, J
    CHAUM, D
    DAMGARD, I
    PEDERSEN, T
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 537 : 189 - 205
  • [45] XML undeniable signatures
    Sun, Lili
    Li, Yan
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING, CONTROL & AUTOMATION JOINTLY WITH INTERNATIONAL CONFERENCE ON INTELLIGENT AGENTS, WEB TECHNOLOGIES & INTERNET COMMERCE, VOL 1, PROCEEDINGS, 2006, : 981 - +
  • [46] An efficient RSA-based certificateless public key encryption scheme
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    DISCRETE APPLIED MATHEMATICS, 2018, 241 : 39 - 47
  • [47] The power of RSA inversion oracles and the security of Chaum's RSA-based blind signature scheme
    Bellare, M
    Namprempre, C
    Pointcheval, D
    Semanko, M
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2002, 2339 : 319 - 338
  • [48] New RSA-Based Public Key Encryption with Authorized Equality Test
    Park, ChanHyeok
    Choi, Seongbong
    Son, Yongseok
    Paek, Jeongyeup
    Cho, Sungrae
    Lee, Hyung Tae
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 299 - 304
  • [49] A randomized RSA-based partially blind signature scheme for electronic cash
    Cao, TJ
    Lin, DD
    Xue, R
    COMPUTERS & SECURITY, 2005, 24 (01) : 44 - 49
  • [50] Quantitative Model Checking of an RSA-based Email Protocol on Mobile Devices
    Petridou, Sophia
    Basagiannis, Stylianos
    Alexiou, Nikolaos
    Papadimitriou, Georgios
    Katsaros, Panagiotis
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,