Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

1.60

CiteScore

Shin-Jia Hwang This email address is being protected from spambots. You need JavaScript enabled to view it.1 and Hao-Chih Liao1

1Department of Computer Science and Information Engineering, Tamkang University, Tamsui, Taiwan 251, R.O.C.


 

Received: March 28, 2005
Accepted: June 6, 2005
Publication Date: March 1, 2006

Download Citation: ||https://doi.org/10.6180/jase.2006.9.1.05  


ABSTRACT


Lee and Hwang proposed group-oriented undeniable signature schemes with a trusted center to guard against Langford’s attack. Unfortunately, there are some security weaknesses in Lee-Hwang’s schemes. Their schemes assume that the signers and verifier should honestly perform steps; otherwise their schemes will fail. To remove this impractical assumption and the corresponding problems, our improvement is proposed.


Keywords: Undeniable Signatures, Group-Oriented Signatures, Threshold Signatures, Digital Signatures


REFERENCES


  1. [1] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, NY: CRC (1996).
  2. [2] Chaum, D. and Antwerpen, H. van, “Undeniable Signatures,” Advances in Cryptology -Crypto ’89, LNCS 435, New York: Springer-Verlag, pp. 212216 (1990).
  3. [3] Chaum, D., “Zero-knowledge Undeniable Signatures,” Advance in Cryptology-Eurocrypt’90, LNCS 473, New York: Springer-Verlag, pp. 458464 (1991).
  4. [4] Harn, L. and Yang, S., “Group-oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party,” Pre-proceeding of Auscrypt’92, LNCS 718, New York: Springer-Verlag, pp.133142 (1993).
  5. [5] Langford, S. K., “Weakness in Some Threshold Cryptosystems,” Advances in Cryptology- Crypto , 96, LNCS 1109, New York: Springer-Verlag, pp. 7482 (1996).
  6. [6] Lee, N. Y. and Hwang, T., “Group Oriented Undeniable Signature Schemes with Trust Center,” Computer Communications, Vol. 22, pp. 730734 (1999).
  7. [7] Michels, M. M. and Stadler, M., “Efficient Convertible Undeniable Signature Schemes,” Proc. 4th Workshop on Selected Areas in Cryptography (SAC’97), Ottawa, Canada, pp. 231244 (1997).
  8. [8] Wang, G., Zhou, J. and Deng, R. H., “Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes,” (2002, Sep.). Cryptology ePrint Archive. [Online]. Available: http://eprint.iacr.org/2002/150/.
  9. [9] Brassard, G., Chaum, D. and Crepeau, C., “Minimum Disclosure Proofs of Knowledge,” Journal of Computer and Systems Science, Vol. 37, pp. 156189 (1988).
  10. [10] Rosen, Kenneth H., Elementary Number Theory and Its Applications, 4th Ed., New York: Addison Wesley Longman, (1999).