Optimization of the MOVA undeniable signature scheme

被引:0
|
作者
Monnerat, J [1 ]
Oswald, YA
Vaudenay, S
机构
[1] EPFL, Lausanne, Switzerland
[2] ETH, Zurich, Switzerland
来源
关键词
undeniable signatures; optimization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents optimization results on the MOVA undeniable signature scheme presented last year by Monnerat and Vaudenay at PKC '04 as well as its generalization proposed at Asiacrypt '04 which is based on a secret group homomorphism. The original MOVA scheme uses characters on Z(n)(*) and some additional candidate homomorphisms were proposed with its generalization. We give an overview of the expected performance of the MOVA scheme depending on the group homomorphism. Our optimizations focus on the quartic residue symbol and a homomorphism based on the computation of a discrete logarithm in a hidden subgroup of Z(n)(*). We demonstrate that the latter provides a signature generation which is three times faster than RSA.
引用
收藏
页码:196 / 209
页数:14
相关论文
共 50 条
  • [41] Undeniable confirmer signature
    Nguyen, K
    Mu, Y
    Varadharajan, V
    INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 235 - 246
  • [42] A NOVEL DISTRIBUTED RSA BLIND AND WEAKLY UNDENIABLE MULTI-SIGNATURE SCHEME
    Chen, Chih-Ying
    Lin, Hsiu-Feng
    Gun, Chiou-Yueh
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (10A): : 6975 - 6998
  • [43] The Convertible Undeniable Multi-Signature Scheme Suitable for Digital Copyright Protection
    Yun, SungHyun
    Lim, HeuiSeok
    ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 594 - 599
  • [44] A new undeniable signature scheme on general linear group over group ring
    Pandey, Atul
    Gupta, Indivar
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (05): : 1261 - 1273
  • [45] Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme
    Srinath M.S.
    Chandrasekaran V.
    Srinath, M. Seshadri (srinathms@sssihl.edu.in), 2018, Femto Technique Co., Ltd. (20) : 9 - 18
  • [46] WEAKNESSES OF UNDENIABLE SIGNATURE SCHEMES
    DESMEDT, Y
    YUNG, MT
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 205 - 220
  • [47] Universally composable undeniable signature
    Kurosawa, Kaoru
    Furukawa, Jun
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 524 - +
  • [48] Applications of Undeniable Signature Schemes
    Yeow, Kin-Woon
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Behnia, Rouzbeh
    2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING APPLICATIONS (ICSIPA), 2015, : 133 - 138
  • [49] Threshold entrusted undeniable signature
    Kim, S
    Won, D
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 : 195 - 203
  • [50] A group-oriented (t,n) undeniable signature scheme without trusted center
    Lin, CH
    Wang, CT
    Chang, CC
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 266 - 274