The security of the FDH variant of Chaum's undeniable signature scheme
In this paper, a new kind of adversarial goal called forge-and-impersonate in undeniable signature schemes is introduced. Note that forgeability does not necessarily imply impersonation ability. The security of the full-domain hash (FDH) variant of Chaum's undeniable signature scheme is then cl...
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2006
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/1973/ http://shdl.mmu.edu.my/1973/2/1624637 |
| _version_ | 1848789928764243968 |
|---|---|
| author | Ogata, Wakaha Kurosawa, Kaoru Heng, Swee Huay |
| author_facet | Ogata, Wakaha Kurosawa, Kaoru Heng, Swee Huay |
| author_sort | Ogata, Wakaha |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | In this paper, a new kind of adversarial goal called forge-and-impersonate in undeniable signature schemes is introduced. Note that forgeability does not necessarily imply impersonation ability. The security of the full-domain hash (FDH) variant of Chaum's undeniable signature scheme is then classified according to three dimensions, the goal of adversaries, the attacks, and the zero-knowledg (ZK) level of confirmation and disavowal protocols. Each security is then related to some well-known computational problem. In particular, the security of the FDH variant of Chaum's scheme with noninteractive zero-knowledge (NIZK) protocol confirmation and disavowal protocols is proven to be equivalent to the computational Diffie-Hellman (CDH) problem, as opposed to the gap Diffie-Hellman (GDH) problem as claimed by Okamoto and Pointcheval. |
| first_indexed | 2025-11-14T18:04:31Z |
| format | Article |
| id | mmu-1973 |
| institution | Multimedia University |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T18:04:31Z |
| publishDate | 2006 |
| publisher | IEEE |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-19732020-12-14T08:15:16Z http://shdl.mmu.edu.my/1973/ The security of the FDH variant of Chaum's undeniable signature scheme Ogata, Wakaha Kurosawa, Kaoru Heng, Swee Huay QC350-467 Optics. Light In this paper, a new kind of adversarial goal called forge-and-impersonate in undeniable signature schemes is introduced. Note that forgeability does not necessarily imply impersonation ability. The security of the full-domain hash (FDH) variant of Chaum's undeniable signature scheme is then classified according to three dimensions, the goal of adversaries, the attacks, and the zero-knowledg (ZK) level of confirmation and disavowal protocols. Each security is then related to some well-known computational problem. In particular, the security of the FDH variant of Chaum's scheme with noninteractive zero-knowledge (NIZK) protocol confirmation and disavowal protocols is proven to be equivalent to the computational Diffie-Hellman (CDH) problem, as opposed to the gap Diffie-Hellman (GDH) problem as claimed by Okamoto and Pointcheval. IEEE 2006-05 Article NonPeerReviewed text en http://shdl.mmu.edu.my/1973/2/1624637 Ogata, Wakaha and Kurosawa, Kaoru and Heng, Swee Huay (2006) The security of the FDH variant of Chaum's undeniable signature scheme. IEEE Transactions on Information Theory, 52 (5). pp. 2006-2017. ISSN 0018-9448 http://dx.doi.org/10.1109/TIT.2006.872853 doi:10.1109/TIT.2006.872853 doi:10.1109/TIT.2006.872853 |
| spellingShingle | QC350-467 Optics. Light Ogata, Wakaha Kurosawa, Kaoru Heng, Swee Huay The security of the FDH variant of Chaum's undeniable signature scheme |
| title | The security of the FDH variant of Chaum's undeniable signature scheme |
| title_full | The security of the FDH variant of Chaum's undeniable signature scheme |
| title_fullStr | The security of the FDH variant of Chaum's undeniable signature scheme |
| title_full_unstemmed | The security of the FDH variant of Chaum's undeniable signature scheme |
| title_short | The security of the FDH variant of Chaum's undeniable signature scheme |
| title_sort | security of the fdh variant of chaum's undeniable signature scheme |
| topic | QC350-467 Optics. Light |
| url | http://shdl.mmu.edu.my/1973/ http://shdl.mmu.edu.my/1973/ http://shdl.mmu.edu.my/1973/ http://shdl.mmu.edu.my/1973/2/1624637 |