首页> 外文期刊>IEEE Transactions on Information Theory >The security of the FDH variant of Chaum's undeniable signature scheme
【24h】

The security of the FDH variant of Chaum's undeniable signature scheme

机译:Chaum不可否认的签名方案的FDH变体的安全性

获取原文
获取原文并翻译 | 示例

摘要

In this paper, a new kind of adversarial goal called forge-and-impersonate in undeniable signature schemes is introduced. Note that forgeability does not necessarily imply impersonation ability. The security of the full-domain hash (FDH) variant of Chaum's undeniable signature scheme is then classified according to three dimensions, the goal of adversaries, the attacks, and the zero-knowledge (ZK) level of confirmation and disavowal protocols. Each security is then related to some well-known computational problem. In particular, the security of the FDH variant of Chaum's scheme with noninteractive zero-knowledge (NIZK) protocol confirmation and disavowal protocols is proven to be equivalent to the computational Diffie-Hellman (CDH) problem, as opposed to the gap Diffie-Hellman (GDH) problem as claimed by Okamoto and Pointcheval.
机译:本文介绍了一种不可否认的签名方案中的伪造和假冒的新型对抗目标。请注意,可伪造并不一定意味着模仿能力。然后,根据以下三个维度对Chaum不可否认的签名方案的全域哈希(FDH)变种的安全性进行分类:攻击者的目标,攻击以及确认和拒绝协议的零知识(ZK)级别。每个安全性都与一些众所周知的计算问题有关。特别是,Chaum方案的FDH变体具有非交互式零知识(NIZK)协议确认和拒绝协议的安全性被证明与计算Diffie-Hellman(CDH)问题等效,与空白Diffie-Hellman(冈本和Pointcheval提出的问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号