Practical fair anonymous undeniable signatures
2004
Abstract
We present a new model for undeniable signatures:
References (18)
- M. Bellare and P. Rogaway, "The exact security of digital signature{how to sign with RSA and Rabin}, " EUROCRYPT 1996, LNCS 1070, Springer, pp. 399-416, 1996.
- J. Boyar, D. Chaum, I. Damgard and T. Pedersen, "Convertible undeniable signatures," Advances in Cryptology -Crypto '90, LNCS 537, pp. 189-205, Springer, 1990.
- C. Boyd and E. Foo, "Off-line fair payment protocols using convertible signatures," in K. Ohta et al (eds.), ASIACRYPT '98, Springer LNCS 1514 (1998) 271-285.
- D. Chaum, and Hans van Antwerpen, "Undeniable signatures," CRYPTO 1989, LNCS 435, Springer, pp. 212-216, 1990.
- D. Chaum, "Zero-knowledge undeniable signatures," EUROCRYPT 1990, LNCS 473, Springer, pp. 458-464, 1991.
- R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," CRYPTO 1998, LNCS 1462, Springer, 13-25, 1998.
- I. Damgard and T. P. Pedersen, convertible undeniable signature scheme," EUROCRYPT 1996, LNCS 1070, Springer, pp. 372-386, 1996.
- S. D. Galbraith and W. Mao. "Invisibility and anonymity of undeniable and confirmer signatures," In: CT-RSA 2003, LNCS 2612, pp. 80-97. Springer-Verlag, 2003.
- S. D. Galbraith, Wenbo Mao, and Kenneth G. Paterson, "RSA-based undeniable signatures for general moduli," CT-RSA 2002. LNCS 2271, Springer, pp. 200-217, 2002.
- R. Gennaro, H. Krawczyk and Tal Rabin, "RSA-based undeniable signatures," Journal of Cryptology (2000) 13: 397-416.
- S. Han, K.Y. Yeung and J. Wang, "Identity based confirmer signatures from pairings over elliptic curves," Proceedings of ACM conference on Electronic commerce, pp. 262-263, 2003.
- S. S. M. Chow, L. C. K. Hui, S. M. Yiu, K. P. Chow, "A secure modified id-based undeniable signature scheme based on Han et al.'s scheme against Zhang et al.'s attacks," Cryptology ePrint Archive, Report 2003/262.
- L. Jongkook, R. Shiryong, K. Jeungseop and Y. Keeyoung, "A new undeniable signature scheme using smart cards," IMA 2001. LNCS 2260, Springer, 387-394, 2001.
- M. Jakobsson, K. Sako and R. Impagliazzo, "Designated verifier proofs and their applications," in U. Maurer (ed.) EUROCRYPT '96, Springer LNCS 1070 (1996) pp. 143-154.
- B. Libert and Jean-Jacques Quisquater. "Identity based undeniable signatures," In: Topics in Cryptology -CT-RSA 2004, LNCS 2964, pp. 112-125. Springer-Verlag, 2004.
- W. Mao, "Modern cryptography: theory and practice," Prentice-Hall, PTR, USA, ISBN 0-13-066943-1, 2004.
- Jean Monnerat and S. Vaudenay, "Undeniable signatures based on characters: how to sign with one bit," Advances in Cryptology PKC'04, Singapore, Lecture Notes in Computer Science, No. 2947, pp. 69-85, Springer-Verlag, 2004.
- Winson K. Y. Yeung and S. Han, "Revocable anonymity of undeniable signature schem." Intelligent Data Engineering and Automated, Learning, IDEAL 2003, Lecture Notes in Computer Science, 2690, Springer.