2010
DOI: 10.1007/978-3-642-12827-1_21
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification

Abstract: Abstract. Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control the verifiability of his signatures. Convertible undeniable signatures, introduced by Boyar, Chaum, Damgård, and Pedersen, furthermore allow the signer to convert signatures to publicly verifiable ones by publicizing a verification token, either for individual signatures or for all signatures universally. In addition, the signer is a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 35 publications
0
12
0
Order By: Relevance
“…Both works indicate that, if using NIZK proofs in undeniable signatures, the common reference string must be legitimately set up (say, by a trusted party like the CA in PKI). Unfortunately, the scheme of Huang and Wong [23] turned out not satisfying anonymity, as shown in [38]. The scheme of [38], while relying on a more standard assumption, produces longer signatures (or public keys) than the ones in this paper.…”
Section: Our Contributionmentioning
confidence: 75%
See 3 more Smart Citations
“…Both works indicate that, if using NIZK proofs in undeniable signatures, the common reference string must be legitimately set up (say, by a trusted party like the CA in PKI). Unfortunately, the scheme of Huang and Wong [23] turned out not satisfying anonymity, as shown in [38]. The scheme of [38], while relying on a more standard assumption, produces longer signatures (or public keys) than the ones in this paper.…”
Section: Our Contributionmentioning
confidence: 75%
“…Unfortunately, the scheme of Huang and Wong [23] turned out not satisfying anonymity, as shown in [38]. The scheme of [38], while relying on a more standard assumption, produces longer signatures (or public keys) than the ones in this paper. Both works [23,38] do not consider unambiguity.…”
Section: Our Contributionmentioning
confidence: 75%
See 2 more Smart Citations
“…SCUS schemes can also be used as a the main building block in protocols such as fair payment [3]. There is a long list of work on SCUS schemes in the literature, including [10,15,17,26,28] in the standard model.…”
Section: Introductionmentioning
confidence: 99%