Abstract
Digital signatures [DH]—unlike handwritten signatures and banknote printing—are easily copied exactly. This property can be advantageous for some uses, such as dissemination of announcements and public keys, where the more copies distributed the better. But it is unsuitable for many other applications. Consider electronic replacements for all the written or oral commitments that are to some extent personally or commercially sensitive. In such cases the proliferation of certified copies could facilitate improper uses like blackmail or industrial espionage. The recipient of such a commitment should of course be able to ensure that the issuer cannot later disavow it—but the recipient should also be unable to show the commitment to anyone else without the issuer’s consent.
Chapter PDF
References
Brassard, G., D. Chaum, and C. Crépeau, “Minimum disclosure proofs of knowledge,” Journal of Computer and System Sciences, vol. 37, 1988, pp. 156–189.
Chaum, D., “Blinding for unanticipated signatures,” Advances in Cryptology—EUROCRYPT’ 87, D. Chaum & W.L. Price Eds., Springer Verlag, 1987, pp. 227–233.
Chaum, D. and J.-H. Evertse, “A secure and privacy-protecting protocol for transmitting personal information between organizations,” Advances in Cryptology—CRYPTO’ 86, A.M. Odlyzko Ed., Springer Verlag, 1987, pp. 118–167.
Diffie, W. and M.E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. IT-22, 1976, pp. 644–654.
ElGamal, T., “A public key cryptosystem and a signature scheme based on discrete logarithm,” IEEE Transactions on Information Theory, vol. IT-31, 1985, pp. 469–472.
Pohlig, S. and M.E. Hellman, “An improved algorithm for computing logarithms over GF(p) and its cryptographic significance,” IEEE Transactions on Information Theory, vol. IT-24, 1978, pp. 106–110.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chaum, D., van Antwerpen, H. (1990). Undeniable Signatures. In: Brassard, G. (eds) Advances in Cryptology — CRYPTO’ 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol 435. Springer, New York, NY. https://doi.org/10.1007/0-387-34805-0_20
Download citation
DOI: https://doi.org/10.1007/0-387-34805-0_20
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97317-3
Online ISBN: 978-0-387-34805-6
eBook Packages: Springer Book Archive