DocumentCode :
918882
Title :
The security of the FDH variant of Chaum´s undeniable signature scheme
Author :
Ogata, Wakaha ; Kurosawa, Kaoru ; Heng, Swee-Huay
Author_Institution :
Tokyo Inst. of Technol., Japan
Volume :
52
Issue :
5
fYear :
2006
fDate :
5/1/2006 12:00:00 AM
Firstpage :
2006
Lastpage :
2017
Abstract :
In this paper, a new kind of adversarial goal called forge-and-impersonate in undeniable signature schemes is introduced. Note that forgeability does not necessarily imply impersonation ability. The security of the full-domain hash (FDH) variant of Chaum´s undeniable signature scheme is then classified according to three dimensions, the goal of adversaries, the attacks, and the zero-knowledge (ZK) level of confirmation and disavowal protocols. Each security is then related to some well-known computational problem. In particular, the security of the FDH variant of Chaum´s scheme with noninteractive zero-knowledge (NIZK) protocol confirmation and disavowal protocols is proven to be equivalent to the computational Diffie-Hellman (CDH) problem, as opposed to the gap Diffie-Hellman (GDH) problem as claimed by Okamoto and Pointcheval.
Keywords :
cryptography; digital signatures; protocols; telecommunication security; CDH; Chaum undeniable signature scheme; FDH; NIZK; computational Diffie-Hellman problem; disavowal protocol; full-domain hash variant; noninteractive zero-knowledge protocol confirmation; security; Application software; Computer science; Digital signatures; Electronic voting; Helium; Information science; Licenses; Protocols; Public key cryptography; Security; Invisibility; security analysis; undeniable signature; unforgeability; zero knowledge (ZK);
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2006.872853
Filename :
1624637
Link To Document :
بازگشت