On the security of nominative signatures

25Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nominative signatures are the dual scheme of undeniable signatures, where only the nominee can verify the nominator (signer)'s signature and if necessary, only the nominee can prove to the third party that the signature issued to him (her) is valid. The first construction was proposed by Kim, Park and Won [7] and it was shown in the recent work of Huang and Wang in ACISP 2004 [5] that Kim-Park-Won's scheme does not satisfy the goal of nominative signatures. Moreover, Huang and Wang suggested a new nominative signature scheme in the same paper. They claimed that the new scheme satisfies all requirements of nominative signatures. In this paper, we show that Huang and Wang's scheme does not satisfy one important property of nominative signatures, namely the nominator (signer) can also verify the validity of the published signature. Moreover, we will show that the nominator can always show to anyone that the signature is indeed a valid signature without any cooperation from the nominee. Hence, the scheme is not nominative, since it does not satisfy the requirements of nominative signatures. Finally, we also discuss the security assumption that needs to be satisfied to obtain secure and efficient nominative signatures. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Susilo, W., & Mu, Y. (2005). On the security of nominative signatures. In Lecture Notes in Computer Science (Vol. 3574, pp. 329–335). Springer Verlag. https://doi.org/10.1007/11506157_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free