RSA-based undeniable signatures

被引:59
|
作者
Gennaro, R
Rabin, T
Krawczyk, H
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
关键词
undeniable signatures; RSA; zero-knowledge;
D O I
10.1007/s001450010001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present the first undeniable signatures scheme based on RSA. Since their introduction in 1989 a significant amount of work has been devoted to the investigation of undeniable signatures. So far, this work has been based on discrete log systems. In contrast, our scheme uses regular RSA signatures to generate undeniable signatures. In this new setting, both the signature and verification exponents of RSA are kept secret by the signer, while the public key consists of a composite modulus and a sample RSA signature on a single public message. Our scheme possesses several attractive properties. First, provable security, as forging the undeniable signatures is as hard as forging regular RSA signatures. Second, both the confirmation and denial protocols are zero-knowledge. In addition, these protocols are efficient (particularly, the confirmation protocol involves only two rounds of communication and a small number of exponentiations). Furthermore, the RSA-based structure of our scheme provides with simple and elegant solutions to add several of the more advanced properties of undeniable signatures found in the literature, including convertibility of the undeniable signatures (into publicly verifiable ones), the possibility to delegate the ability to confirm and deny signatures to a third party without giving up the power to sign, and the existence of distributed (threshold) versions of the signing and confirmation operations. Due to the above properties and the fact that our undeniable signatures are identical in form to standard RSA signatures, the scheme we present becomes a very attractive candidate for practical implementations.
引用
收藏
页码:397 / 416
页数:20
相关论文
共 50 条
  • [1] The Research of RSA-Based Undeniable Signature Method
    Li, Xin
    Liu, Chunxiao
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 801 - +
  • [2] New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
    Phong, Le Trieu
    Kurosawa, Kaoru
    Ogata, Wakaha
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 116 - +
  • [3] New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
    Phong, Le Trieu
    Kurosawa, Kaoru
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 63 - 75
  • [4] Identity based undeniable signatures
    Libert, B
    Quisquater, JJ
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 112 - 125
  • [5] A New RSA-Based Signature Scheme
    Schaege, Sven
    Schwenk, Joerg
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 1 - 15
  • [6] RSA-Based Handshake protocol in Internet of Things
    Mao, Junye
    Zhu, Huiying
    Liu, Yulan
    Liu, Yuanjing
    Qian, Weihao
    Zhang, Jie
    Huang, Xin
    2018 NINTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME 2018), 2018, : 989 - 993
  • [7] On the Efficiency of Revocation in RSA-Based Anonymous Systems
    Fueyo, Maria
    Herranz, Javier
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1782 - 1790
  • [8] RSA-Based Certificateless Public Key Encryption
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Kou, Weidong
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 24 - +
  • [9] An efficient RSA-based certificateless signature scheme
    Zhang, Jianhong
    Mao, Jane
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (03) : 638 - 642
  • [10] The sampling twice technique for the RSA-based cryptosystems with anonymity
    Hayashi, R
    Tanaka, K
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 216 - 233