The security of the FDH variant of Chaum's undeniable signature scheme

In this paper, a new kind of adversarial goal called forge-and-impersonate in undeniable signature schemes is introduced. Note that forgeability does not necessarily imply impersonation ability. The security of the full-domain hash (FDH) variant of Chaum's undeniable signature scheme is then cl...

Full description

Bibliographic Details
Main Authors: Ogata, Wakaha, Kurosawa, Kaoru, Heng, Swee Huay
Format: Article
Language:English
Published: IEEE 2006
Subjects:
Online Access:http://shdl.mmu.edu.my/1973/
http://shdl.mmu.edu.my/1973/2/1624637
_version_ 1848789928764243968
author Ogata, Wakaha
Kurosawa, Kaoru
Heng, Swee Huay
author_facet Ogata, Wakaha
Kurosawa, Kaoru
Heng, Swee Huay
author_sort Ogata, Wakaha
building MMU Institutional Repository
collection Online Access
description In this paper, a new kind of adversarial goal called forge-and-impersonate in undeniable signature schemes is introduced. Note that forgeability does not necessarily imply impersonation ability. The security of the full-domain hash (FDH) variant of Chaum's undeniable signature scheme is then classified according to three dimensions, the goal of adversaries, the attacks, and the zero-knowledg (ZK) level of confirmation and disavowal protocols. Each security is then related to some well-known computational problem. In particular, the security of the FDH variant of Chaum's scheme with noninteractive zero-knowledge (NIZK) protocol confirmation and disavowal protocols is proven to be equivalent to the computational Diffie-Hellman (CDH) problem, as opposed to the gap Diffie-Hellman (GDH) problem as claimed by Okamoto and Pointcheval.
first_indexed 2025-11-14T18:04:31Z
format Article
id mmu-1973
institution Multimedia University
institution_category Local University
language English
last_indexed 2025-11-14T18:04:31Z
publishDate 2006
publisher IEEE
recordtype eprints
repository_type Digital Repository
spelling mmu-19732020-12-14T08:15:16Z http://shdl.mmu.edu.my/1973/ The security of the FDH variant of Chaum's undeniable signature scheme Ogata, Wakaha Kurosawa, Kaoru Heng, Swee Huay QC350-467 Optics. Light In this paper, a new kind of adversarial goal called forge-and-impersonate in undeniable signature schemes is introduced. Note that forgeability does not necessarily imply impersonation ability. The security of the full-domain hash (FDH) variant of Chaum's undeniable signature scheme is then classified according to three dimensions, the goal of adversaries, the attacks, and the zero-knowledg (ZK) level of confirmation and disavowal protocols. Each security is then related to some well-known computational problem. In particular, the security of the FDH variant of Chaum's scheme with noninteractive zero-knowledge (NIZK) protocol confirmation and disavowal protocols is proven to be equivalent to the computational Diffie-Hellman (CDH) problem, as opposed to the gap Diffie-Hellman (GDH) problem as claimed by Okamoto and Pointcheval. IEEE 2006-05 Article NonPeerReviewed text en http://shdl.mmu.edu.my/1973/2/1624637 Ogata, Wakaha and Kurosawa, Kaoru and Heng, Swee Huay (2006) The security of the FDH variant of Chaum's undeniable signature scheme. IEEE Transactions on Information Theory, 52 (5). pp. 2006-2017. ISSN 0018-9448 http://dx.doi.org/10.1109/TIT.2006.872853 doi:10.1109/TIT.2006.872853 doi:10.1109/TIT.2006.872853
spellingShingle QC350-467 Optics. Light
Ogata, Wakaha
Kurosawa, Kaoru
Heng, Swee Huay
The security of the FDH variant of Chaum's undeniable signature scheme
title The security of the FDH variant of Chaum's undeniable signature scheme
title_full The security of the FDH variant of Chaum's undeniable signature scheme
title_fullStr The security of the FDH variant of Chaum's undeniable signature scheme
title_full_unstemmed The security of the FDH variant of Chaum's undeniable signature scheme
title_short The security of the FDH variant of Chaum's undeniable signature scheme
title_sort security of the fdh variant of chaum's undeniable signature scheme
topic QC350-467 Optics. Light
url http://shdl.mmu.edu.my/1973/
http://shdl.mmu.edu.my/1973/
http://shdl.mmu.edu.my/1973/
http://shdl.mmu.edu.my/1973/2/1624637