Title :
The security of the FDH variant of Chaum´s undeniable signature scheme
Author :
Ogata, Wakaha ; Kurosawa, Kaoru ; Heng, Swee-Huay
Author_Institution :
Tokyo Inst. of Technol., Japan
fDate :
5/1/2006 12:00:00 AM
Abstract :
In this paper, a new kind of adversarial goal called forge-and-impersonate in undeniable signature schemes is introduced. Note that forgeability does not necessarily imply impersonation ability. The security of the full-domain hash (FDH) variant of Chaum´s undeniable signature scheme is then classified according to three dimensions, the goal of adversaries, the attacks, and the zero-knowledge (ZK) level of confirmation and disavowal protocols. Each security is then related to some well-known computational problem. In particular, the security of the FDH variant of Chaum´s scheme with noninteractive zero-knowledge (NIZK) protocol confirmation and disavowal protocols is proven to be equivalent to the computational Diffie-Hellman (CDH) problem, as opposed to the gap Diffie-Hellman (GDH) problem as claimed by Okamoto and Pointcheval.
Keywords :
cryptography; digital signatures; protocols; telecommunication security; CDH; Chaum undeniable signature scheme; FDH; NIZK; computational Diffie-Hellman problem; disavowal protocol; full-domain hash variant; noninteractive zero-knowledge protocol confirmation; security; Application software; Computer science; Digital signatures; Electronic voting; Helium; Information science; Licenses; Protocols; Public key cryptography; Security; Invisibility; security analysis; undeniable signature; unforgeability; zero knowledge (ZK);
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2006.872853