Short Undeniable Signatures Based on Group Homomorphisms
نویسندگان
چکیده
منابع مشابه
Convertible Group Undeniable Signatures
Group undeniable signatures are like ordinary group signatures except that verifying signatures needs the help of the group manager. In this paper, we propose a convertible group undeniable signature scheme in which the group manager can turn all or selective signatures, which are originally group undeniable signatures, into ordinary group signatures without compromising security of the secret ...
متن کاملGroup Undeniable Signatures
A group undeniable signature scheme is proposed in which each group member can sign on behalf of the group without revealing his or her identity and the verification of a signature can only be done with the cooperation of the group manager. For business applications, group undeniable signatures can be used to validate price lists, press release or digital contracts when the signatures are comme...
متن کاملShort 2-Move Undeniable Signatures
Attempting to reach a minimal number of moves in cryptographic protocols is a quite classical issue. Besides the theoretical interests, minimizing the number of moves can clearly facilitate practical implementations in environments with communication constraints. In this paper, we offer a solution to this problem in the context of undeniable signatures with interactive verification protocols by...
متن کاملIdentity Based Undeniable Signatures
In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security model for the notions of invisibility and anonymity given by Galbraith and Mao in 2003 and we prove that our scheme is existentially unforgeable under the Bilinear Diffie-Hellman assumption in the random oracle model. We also pro...
متن کاملShort undeniable SignatureS: deSign, analySiS, and applicationS
Digital signatures are one of the main achievements of public-key cryptography and constitute a fundamental tool to ensure data authentication. Although their universal verifiability has the advantage to facilitate their verification by the recipient, this property may have undesirable consequences when dealing with sensitive and private information. Motivated by such considerations, undeniable...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptology
سال: 2010
ISSN: 0933-2790,1432-1378
DOI: 10.1007/s00145-010-9070-1