Show simple item record

dc.contributor.authorHan, Song
dc.contributor.authorChang, Elizabeth
dc.contributor.authorWang, J.
dc.date.accessioned2017-01-30T10:48:29Z
dc.date.available2017-01-30T10:48:29Z
dc.date.created2008-11-12T23:25:26Z
dc.date.issued2005
dc.identifier.citationHan, Song and Chang, Elizabeth and Wang, Jie. 2005. : An attack on undeniable partially blind signatures, in Blyth, A. (ed), First European Conference on Computer Network Defence (EC2ND), Dec 15 2005, pp. 139-146. Glamorgan, UK: Springer-Verlag.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/5780
dc.description.abstract

Blind signatures allow a user to get a signature on any message without revealing the content of the message to the signer. Partially blind signatures allow the signer to explicitly include common information in the blind signature under some agreement with the user. Undeniable signatures can only be verified with the help of the signer. However, if a signature is only verifiable with the aid of the signer, a dishonest signer may disavow a genuine document. Undeniable signatures solve this problem by adding a new component called the disavowal protocol in addition to the normal components of signature and verification. Disavowal protocol can prevent a dishonest signer from disavowing a valid signature. The convertible undeniable signatures allow the signer to convert given signatures into universally verifiable signatures. To combine all the above characteristics, Huang et al. proposed a convertible undeniable partially blind signature scheme at IEEE AINA 2005. They extended the concept of partially blind signature to the convertible undeniable partially blind signature, in which only the signer can verify given signatures on messages, and confirm/disavow the validity/invalidity of given signatures, and convert them into universally verifiable signatures. However, their scheme is not secure. In this paper, we present an attack on the convertible undeniable partially blind signature scheme.

dc.publisherSpringer-Verlag
dc.relation.urihttp://www.springer.com
dc.subjectSecurity protocol
dc.subjectPartially blind signature
dc.subjectBlind signature
dc.subjectAttack
dc.subjectsecure
dc.subjectinformation systems
dc.subjectsecurity
dc.subjectConvertible undeniable signature
dc.titleAn attack on undeniable partially blind signatures
dc.typeConference Paper
dcterms.source.startPage139
dcterms.source.endPage146
dcterms.source.titleProceedings of the First European Conference on Computer Network Defence (EC2ND)
dcterms.source.seriesProceedings of the First European Conference on Computer Network Defence (EC2ND)
dcterms.source.conferenceFirst European Conference on Computer Network Defence (EC2ND)
dcterms.source.conference-start-dateDec 15 2005
dcterms.source.conferencelocationGlamorgan, UK
dcterms.source.placeLondon, UK
curtin.note

EC2ND 2005

curtin.note

Proceedings of the First European Conference on Computer Network Defence

curtin.note

School of Computing, University of Glamorgan, Wales UK

curtin.note

Blyth, Andrew (Ed.) 2006, IX, 296 p. 123 illus., Softcover

curtin.note

ISBN: 978-1-84628-311-6

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.identifierEPR-731
curtin.accessStatusFulltext not available
curtin.facultyCurtin Business School
curtin.facultySchool of Information Systems


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record