Optimization of the MOVA undeniable signature scheme

被引:0
|
作者
Monnerat, J [1 ]
Oswald, YA
Vaudenay, S
机构
[1] EPFL, Lausanne, Switzerland
[2] ETH, Zurich, Switzerland
来源
关键词
undeniable signatures; optimization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents optimization results on the MOVA undeniable signature scheme presented last year by Monnerat and Vaudenay at PKC '04 as well as its generalization proposed at Asiacrypt '04 which is based on a secret group homomorphism. The original MOVA scheme uses characters on Z(n)(*) and some additional candidate homomorphisms were proposed with its generalization. We give an overview of the expected performance of the MOVA scheme depending on the group homomorphism. Our optimizations focus on the quartic residue symbol and a homomorphism based on the computation of a discrete logarithm in a hidden subgroup of Z(n)(*). We demonstrate that the latter provides a signature generation which is three times faster than RSA.
引用
收藏
页码:196 / 209
页数:14
相关论文
共 50 条
  • [31] New convertible undeniable signature scheme's and attack models
    Kobayashi, Y
    Nagata, H
    Saito, T
    Tsujii, S
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS III, 2002, : 107 - 112
  • [32] The security of the FDH variant of Chaum's undeniable signature scheme
    Ogata, WH
    Kurosawa, KR
    Heng, SH
    PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 328 - 345
  • [33] Undeniable (t, n)-threshold signature scheme with cheater identification
    Lin, TY
    Wu, TC
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 1998, 21 (06) : 775 - 780
  • [34] The security of the FDH variant of Chaum's undeniable signature scheme
    Ogata, W
    Kurosawa, K
    Heng, SH
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (05) : 2006 - 2017
  • [35] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
  • [36] A novel and efficient undeniable signature scheme based on group ring
    Mittal, Gaurav
    Kumar, Sandeep
    Kumar, Sunil
    Mittal, Shubham
    Soft Computing, 2024, 28 (23) : 13053 - 13070
  • [37] The large scale electronic voting scheme based on undeniable multi-signature scheme
    Yun, SH
    Lee, HW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 391 - 400
  • [38] On the security of Yuan et al.'s undeniable signature scheme
    Zhao, Wei
    International Journal of Network Security, 2010, 11 (03) : 177 - 180
  • [39] A Group-Oriented Undeniable Signature Scheme for Unlikely Signers and Verifiers
    Hwang, Shin-Jia
    Liao, Hao-Chih
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2006, 9 (01): : 45 - 54
  • [40] A group-oriented undeniable signature scheme for unlikely signers and verifiers
    Hwang, Shin-Jia
    Liao, Hao-Chih
    Tamkang Journal of Science and Engineering, 2006, 9 (01): : 45 - 54