Lee and Hwang proposed group-oriented undeniable signature schemes with a trusted center to guard against Langford’s attack. Unfortunately, there are some security weaknesses in Lee-Hwang’s schemes. Their schemes assume that the signers and verifier should honestly perform steps; otherwise their schemes will fail. To remove this impractical assumption and the corresponding problems, our improvement is proposed.
Keywords: Undeniable Signatures, Group-Oriented Signatures, Threshold Signatures, Digital Signatures
REFERENCES
[1] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, NY: CRC (1996).
[2] Chaum, D. and Antwerpen, H. van, “Undeniable Signatures,” Advances in Cryptology -Crypto ’89, LNCS 435, New York: Springer-Verlag, pp. 212216 (1990).
[3] Chaum, D., “Zero-knowledge Undeniable Signatures,” Advance in Cryptology-Eurocrypt’90, LNCS 473, New York: Springer-Verlag, pp. 458464 (1991).
[4] Harn, L. and Yang, S., “Group-oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party,” Pre-proceeding of Auscrypt’92, LNCS 718, New York: Springer-Verlag, pp.133142 (1993).
[5] Langford, S. K., “Weakness in Some Threshold Cryptosystems,” Advances in Cryptology- Crypto , 96, LNCS 1109, New York: Springer-Verlag, pp. 7482 (1996).
[6] Lee, N. Y. and Hwang, T., “Group Oriented Undeniable Signature Schemes with Trust Center,” Computer Communications, Vol. 22, pp. 730734 (1999).
[7] Michels, M. M. and Stadler, M., “Efficient Convertible Undeniable Signature Schemes,” Proc. 4th Workshop on Selected Areas in Cryptography (SAC’97), Ottawa, Canada, pp. 231244 (1997).
[8] Wang, G., Zhou, J. and Deng, R. H., “Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes,” (2002, Sep.). Cryptology ePrint Archive. [Online]. Available: http://eprint.iacr.org/2002/150/.
[9] Brassard, G., Chaum, D. and Crepeau, C., “Minimum Disclosure Proofs of Knowledge,” Journal of Computer and Systems Science, Vol. 37, pp. 156189 (1988).
[10] Rosen, Kenneth H., Elementary Number Theory and Its Applications, 4th Ed., New York: Addison Wesley Longman, (1999).
We use cookies on this website to personalize content to improve your user experience and analyze our traffic. By using this site you agree to its use of cookies.