Skip to main content

An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2000 (ICISC 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2015))

Included in the following conference series:

Abstract

Digital signatures are important applications of public key cryptography in today’s digital networks. However, they have a problem that anyone can verify the signature even if a signer wants to restrict the verifiers to confirm his signatures. D. Chaum et al.[1] proposed undeniable signatures to solve this problem. These signatures are based on the discrete logarithm problem and are extended to those with different properties [2]-[4]. After that, R.Gennaro et al.[5] proposed another undeniable signature scheme based on RSA. However, this scheme also has following problems. Firstly, the undeniable signature of them cannot be converted into a usual signature individually. So if a user wants to use both of the undeniable signature and the usual signature, he must prepare separate parameters for each type of signatures. Secondly, the denial protocol is not deterministic because it uses a zero knowledge interactive proof. So it is not efficient. Thirdly, their signature system cannot resist hidden verifier attack[7]. In this paper we will propose an improved scheme to solve these problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Chaum and H. V. Antwerpen,“Undeniable Signatures”, Proc. CRYPTO’89 pp.212–217, 1990.

    Google Scholar 

  2. D. Chaum,“Zero-Knowledge Undeniable Signatures”, Proc. EUROCRYPTO’90 pp.458–464, 1990.

    Google Scholar 

  3. J. Boyar, D. Chaum, I. Damgård and T. Pedersen, “Convertible Undeniable Signatures”, Proc. CRYPTO’90 pp.189–205, 1991.

    Google Scholar 

  4. D. Chaum, “Designated Confirmer Signatures”, Proc. EUROCRYPTO’94 pp.86–91, 1994.

    Google Scholar 

  5. R. Gennaro, H. Krawczyk and T. Rabin, “RSA-Based Undeniable Signatures”, Proc. CRYPTO’97 pp.132–149, 1997. http://www.research.ibm.com/security/RSAunden.ps

  6. Y. Desmedt and M. Yung, “Weaknesses of Undeniable Signature Schemes”, Advances in Cryptology Proceedings of EUROCRYPTO’91

    Google Scholar 

  7. M. Jakobsson, K. Sako and R. Impagliazzo, “Designated Verifier Proofs and Their Applications”, Advances in Cryptology-EUROCRYPT’96, Lecture Notes in Computer Science 1070, Springer-Verlag, pp.143–154, 1996.

    Google Scholar 

  8. R. Housley, SPYRUS, W. Ford, VeriSign, W. Polk, NIST, D. Solo, and Citicorp “Internet X.509 Public Key Infrastructure Certificate and CRL Profile”, RFC2459, 1999.

    Google Scholar 

  9. R. Gennaro, D. Micciancio and T. Rabin, ”An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products”,Proc. of the Fifth ACM Conference on Computer and Communications Security, 1998. http://www.research.ibm.com/security/safeprime.ps

  10. D.R. Stinson, CRYPTOGRAPHY, pp.218–225, CRC Press, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Miyazaki, T. (2001). An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA. In: Won, D. (eds) Information Security and Cryptology — ICISC 2000. ICISC 2000. Lecture Notes in Computer Science, vol 2015. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45247-8_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-45247-8_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41782-8

  • Online ISBN: 978-3-540-45247-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics