RSA-based undeniable signatures

被引:59
|
作者
Gennaro, R
Rabin, T
Krawczyk, H
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] Technion Israel Inst Technol, Dept Elect Engn, IL-32000 Haifa, Israel
关键词
undeniable signatures; RSA; zero-knowledge;
D O I
10.1007/s001450010001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present the first undeniable signatures scheme based on RSA. Since their introduction in 1989 a significant amount of work has been devoted to the investigation of undeniable signatures. So far, this work has been based on discrete log systems. In contrast, our scheme uses regular RSA signatures to generate undeniable signatures. In this new setting, both the signature and verification exponents of RSA are kept secret by the signer, while the public key consists of a composite modulus and a sample RSA signature on a single public message. Our scheme possesses several attractive properties. First, provable security, as forging the undeniable signatures is as hard as forging regular RSA signatures. Second, both the confirmation and denial protocols are zero-knowledge. In addition, these protocols are efficient (particularly, the confirmation protocol involves only two rounds of communication and a small number of exponentiations). Furthermore, the RSA-based structure of our scheme provides with simple and elegant solutions to add several of the more advanced properties of undeniable signatures found in the literature, including convertibility of the undeniable signatures (into publicly verifiable ones), the possibility to delegate the ability to confirm and deny signatures to a third party without giving up the power to sign, and the existence of distributed (threshold) versions of the signing and confirmation operations. Due to the above properties and the fact that our undeniable signatures are identical in form to standard RSA signatures, the scheme we present becomes a very attractive candidate for practical implementations.
引用
收藏
页码:397 / 416
页数:20
相关论文
共 50 条
  • [21] Undeniable and Unpretendable Signatures
    Le Trieu Phong
    Kurosawa, Kaoru
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 138 - 150
  • [22] The power of RSA inversion oracles and the security of Chaum's RSA-based blind signature scheme
    Bellare, M
    Namprempre, C
    Pointcheval, D
    Semanko, M
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2002, 2339 : 319 - 338
  • [23] An efficient RSA-based certificateless public key encryption scheme
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    DISCRETE APPLIED MATHEMATICS, 2018, 241 : 39 - 47
  • [24] A randomized RSA-based partially blind signature scheme for electronic cash
    Cao, TJ
    Lin, DD
    Xue, R
    COMPUTERS & SECURITY, 2005, 24 (01) : 44 - 49
  • [25] Security analysis on an improvement of RSA-based password authenticated key exchange
    Wang, SH
    Bao, F
    Wang, J
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (04) : 1641 - 1646
  • [26] Group undeniable signatures with convertibility
    Lyuu, Yuh-Dauh
    Wu, Ming-Luen
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2010, 25 (05): : 323 - 333
  • [27] A RSA-Based Data Integrity Check without Original Data in the Cloud Computing
    Zhang, Jianhong
    Liu, Xue
    Lu, Chenglian
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE, PTS 1-4, 2011, 44-47 : 3726 - +
  • [28] Transitive signatures based on factoring and RSA
    Bellare, M
    Neven, G
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 397 - 414
  • [29] Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack
    Hyder, Muhammad Faraz
    Tooba, Syeda
    Waseemullah
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (04) : 7321 - 7325
  • [30] RSA-based Password-Authenticated Key Retrieval using Multiple Servers
    Shin, SeongHan
    Kobara, Kazukuni
    2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 106 - 111