Shin-Jia Hwang 1 and Hao-Chih Liao1
1Department of Computer Science and Information Engineering, Tamkang University, Tamsui, Taiwan 251, R.O.C.
Received:
March 28, 2005
Accepted:
June 6, 2005
Publication Date:
March 1, 2006
Download Citation:
||https://doi.org/10.6180/jase.2006.9.1.05
ABSTRACT
Lee and Hwang proposed group-oriented undeniable signature schemes with a trusted center to guard against Langford’s attack. Unfortunately, there are some security weaknesses in Lee-Hwang’s schemes. Their schemes assume that the signers and verifier should honestly perform steps; otherwise their schemes will fail. To remove this impractical assumption and the corresponding problems, our improvement is proposed.
Keywords:
Undeniable Signatures, Group-Oriented Signatures, Threshold Signatures, Digital Signatures
REFERENCES
- [1] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, NY: CRC (1996).
- [2] Chaum, D. and Antwerpen, H. van, “Undeniable Signatures,” Advances in Cryptology -Crypto ’89, LNCS 435, New York: Springer-Verlag, pp. 212216 (1990).
- [3] Chaum, D., “Zero-knowledge Undeniable Signatures,” Advance in Cryptology-Eurocrypt’90, LNCS 473, New York: Springer-Verlag, pp. 458464 (1991).
- [4] Harn, L. and Yang, S., “Group-oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party,” Pre-proceeding of Auscrypt’92, LNCS 718, New York: Springer-Verlag, pp.133142 (1993).
- [5] Langford, S. K., “Weakness in Some Threshold Cryptosystems,” Advances in Cryptology- Crypto , 96, LNCS 1109, New York: Springer-Verlag, pp. 7482 (1996).
- [6] Lee, N. Y. and Hwang, T., “Group Oriented Undeniable Signature Schemes with Trust Center,” Computer Communications, Vol. 22, pp. 730734 (1999).
- [7] Michels, M. M. and Stadler, M., “Efficient Convertible Undeniable Signature Schemes,” Proc. 4th Workshop on Selected Areas in Cryptography (SAC’97), Ottawa, Canada, pp. 231244 (1997).
- [8] Wang, G., Zhou, J. and Deng, R. H., “Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes,” (2002, Sep.). Cryptology ePrint Archive. [Online]. Available: http://eprint.iacr.org/2002/150/.
- [9] Brassard, G., Chaum, D. and Crepeau, C., “Minimum Disclosure Proofs of Knowledge,” Journal of Computer and Systems Science, Vol. 37, pp. 156189 (1988).
- [10] Rosen, Kenneth H., Elementary Number Theory and Its Applications, 4th Ed., New York: Addison Wesley Longman, (1999).