Academia.eduAcademia.edu

Outline

Practical fair anonymous undeniable signatures

2004

Abstract

We present a new model for undeniable signatures:

References (18)

  1. M. Bellare and P. Rogaway, "The exact security of digital signature{how to sign with RSA and Rabin}, " EUROCRYPT 1996, LNCS 1070, Springer, pp. 399-416, 1996.
  2. J. Boyar, D. Chaum, I. Damgard and T. Pedersen, "Convertible undeniable signatures," Advances in Cryptology -Crypto '90, LNCS 537, pp. 189-205, Springer, 1990.
  3. C. Boyd and E. Foo, "Off-line fair payment protocols using convertible signatures," in K. Ohta et al (eds.), ASIACRYPT '98, Springer LNCS 1514 (1998) 271-285.
  4. D. Chaum, and Hans van Antwerpen, "Undeniable signatures," CRYPTO 1989, LNCS 435, Springer, pp. 212-216, 1990.
  5. D. Chaum, "Zero-knowledge undeniable signatures," EUROCRYPT 1990, LNCS 473, Springer, pp. 458-464, 1991.
  6. R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," CRYPTO 1998, LNCS 1462, Springer, 13-25, 1998.
  7. I. Damgard and T. P. Pedersen, convertible undeniable signature scheme," EUROCRYPT 1996, LNCS 1070, Springer, pp. 372-386, 1996.
  8. S. D. Galbraith and W. Mao. "Invisibility and anonymity of undeniable and confirmer signatures," In: CT-RSA 2003, LNCS 2612, pp. 80-97. Springer-Verlag, 2003.
  9. S. D. Galbraith, Wenbo Mao, and Kenneth G. Paterson, "RSA-based undeniable signatures for general moduli," CT-RSA 2002. LNCS 2271, Springer, pp. 200-217, 2002.
  10. R. Gennaro, H. Krawczyk and Tal Rabin, "RSA-based undeniable signatures," Journal of Cryptology (2000) 13: 397-416.
  11. S. Han, K.Y. Yeung and J. Wang, "Identity based confirmer signatures from pairings over elliptic curves," Proceedings of ACM conference on Electronic commerce, pp. 262-263, 2003.
  12. S. S. M. Chow, L. C. K. Hui, S. M. Yiu, K. P. Chow, "A secure modified id-based undeniable signature scheme based on Han et al.'s scheme against Zhang et al.'s attacks," Cryptology ePrint Archive, Report 2003/262.
  13. L. Jongkook, R. Shiryong, K. Jeungseop and Y. Keeyoung, "A new undeniable signature scheme using smart cards," IMA 2001. LNCS 2260, Springer, 387-394, 2001.
  14. M. Jakobsson, K. Sako and R. Impagliazzo, "Designated verifier proofs and their applications," in U. Maurer (ed.) EUROCRYPT '96, Springer LNCS 1070 (1996) pp. 143-154.
  15. B. Libert and Jean-Jacques Quisquater. "Identity based undeniable signatures," In: Topics in Cryptology -CT-RSA 2004, LNCS 2964, pp. 112-125. Springer-Verlag, 2004.
  16. W. Mao, "Modern cryptography: theory and practice," Prentice-Hall, PTR, USA, ISBN 0-13-066943-1, 2004.
  17. Jean Monnerat and S. Vaudenay, "Undeniable signatures based on characters: how to sign with one bit," Advances in Cryptology PKC'04, Singapore, Lecture Notes in Computer Science, No. 2947, pp. 69-85, Springer-Verlag, 2004.
  18. Winson K. Y. Yeung and S. Han, "Revocable anonymity of undeniable signature schem." Intelligent Data Engineering and Automated, Learning, IDEAL 2003, Lecture Notes in Computer Science, 2690, Springer.