An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
نویسندگان
چکیده
Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control the verifiability of his signatures. Convertible undeniable signatures, introduced by Boyar, Chaum, Damg̊ard, and Pedersen, furthermore allow the signer to convert signatures to publicly verifiable ones by publicizing a verification token, either for individual signatures or for all signatures universally. In addition, the signer is able to delegate the ability to prove validity and convert signatures to a semi-trusted third party by providing a verification key. While the latter functionality is implemented by the early convertible undeniable signature schemes, most recent schemes do not consider this despite its practical appeal. In this paper we present an updated definition and security model for schemes allowing delegation, and highlight a new essential security property, token soundness, which is not formally treated in the previous security models for convertible undeniable signatures. We then propose a new convertible undeniable signature scheme. The scheme allows delegation of verification and is provably secure in the standard model assuming the computational co-Diffie-Hellman problem, a closely related problem, and the decisional linear problem are hard. Our scheme is, to the best of our knowledge, the currently most efficient convertible undeniable signature scheme which provably fulfills all security requirements in the standard model.
منابع مشابه
A Note on a Convertible Undeniable Signature Scheme with Delegatable Verification
Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control the verifiability of his signatures. Convertible undeniable signatures, introduced by Boyar, Chaum, Damg̊ard, and Pedersen, furthermore allow the signer to convert signatures to publicly verifiable ones by publicizing a verifica...
متن کاملToward a Generic Construction of Convertible Undeniable Signatures from Pairing-Based Signatures
Undeniable signatures were proposed to limit the verification property of ordinary digital signatures. In fact, the verification of such signatures cannot be attained without the help of the signer, via the confirmation/denial protocols. Later, the concept was refined to give the possibility of converting a selected signature into an ordinary one, or publishing a universal receipt that turns al...
متن کاملNew Constructions of Convertible Undeniable Signature Schemes without Random Oracles
In Undeniable Signature, a signature’s validity can only be confirmed or disavowed with thehelp of an alleged signer via a confirmation or disavowal protocol. A Convertible undeniablesignature further allows the signer to release some additional information which can make anundeniable signature become publicly verifiable. In this work we introduce a new kind of attacks,called cl...
متن کاملShort Convertible Undeniable Signature From Pairing
Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control the verifiability of his signatures. Convertible undeniable signatures allow the signer to convert undeniable signatures into ordinary signatures. In this paper we propose some extended variants of the famous DiffieHellman assu...
متن کاملEecient Convertible Undeniable Signature Schemes Extended Abstract
Undeniable signatures are digital signatures which are not universally veri able but can only be checked with the signer's help. However, the signer cannot deny the validity of a correct signature. An extended concept, convertible undeniable signatures, allows the signer to convert single undeniable signatures or even the whole scheme into universally veri able signatures or into an ordinary di...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2009 شماره
صفحات -
تاریخ انتشار 2009