Provably secure identity-based undeniable signatures with selective and universal convertibility

被引:0
作者
Wu, Wei [1 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
Huang, Xinyi [1 ]
机构
[1] Univ Wollongong, Ctr Comp & Informat Secur Res, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
来源
INFORMATION SECURITY AND CRYPTOLOGY | 2008年 / 4990卷
关键词
undeniable signatures; convertible; identity-based; provable security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present the first concrete example of identity-based undeniable signature with selective and universal convertibility, where the signer can release a selective proof to make a single undeniable signature publicly verifiable, or publish a universal proof to convert all his undeniable signatures, into ordinary digital signatures. Furthermore, we also formalized the security models of identity-based convertible undeniable signatures. The new models capture more essence of the, property "convertibility" of identity-based undeniable signatures, compared with other known security models. Our scheme call be regarded as an improvement of Libert and Quisquater's identity-based undeniable signature scheme published in CT-RSA 2004. The security of our scheme is formally proven in the random oracle model under some well-known complexity assumptions. Its uuforgeability relies on the hardness of the Computational Diffie-Hellman problem, while the invisibility (and anonymity) is based on the hardness of Decisional Bilinear Diffie-Hellman problem.
引用
收藏
页码:25 / 39
页数:15
相关论文
共 22 条
[11]  
Gennaro R, 1997, LECT NOTES COMPUT SC, V1294, P132
[12]   RSA-based undeniable signatures [J].
Gennaro, R ;
Rabin, T ;
Krawczyk, H .
JOURNAL OF CRYPTOLOGY, 2000, 13 (04) :397-416
[13]  
HAN S, 2003, P ACM EL COMM 2003, P262
[14]  
Jakobsson M, 1996, LECT NOTES COMPUT SC, V1070, P143
[15]  
Laguillaumie F, 2005, LECT NOTES COMPUT SC, V3376, P154
[16]  
Libert B, 2004, LECT NOTES COMPUT SC, V2964, P112
[17]  
Michels M., 1996, 3rd ACM Conference on Computer and Communications Security, P148, DOI 10.1145/238168.238207
[18]  
Michels M., 1997, 4 INT WORKSH SEL AR, P231
[19]  
Miyazaki T., 2000, LNCS, V2015, P135
[20]  
Ogata WH, 2005, LECT NOTES COMPUT SC, V3386, P328