An attack on undeniable partially blind signatures
dc.contributor.author | Han, Song | |
dc.contributor.author | Chang, Elizabeth | |
dc.contributor.author | Wang, J. | |
dc.date.accessioned | 2017-01-30T10:48:29Z | |
dc.date.available | 2017-01-30T10:48:29Z | |
dc.date.created | 2008-11-12T23:25:26Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Han, Song and Chang, Elizabeth and Wang, Jie. 2005. : An attack on undeniable partially blind signatures, in Blyth, A. (ed), First European Conference on Computer Network Defence (EC2ND), Dec 15 2005, pp. 139-146. Glamorgan, UK: Springer-Verlag. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/5780 | |
dc.description.abstract |
Blind signatures allow a user to get a signature on any message without revealing the content of the message to the signer. Partially blind signatures allow the signer to explicitly include common information in the blind signature under some agreement with the user. Undeniable signatures can only be verified with the help of the signer. However, if a signature is only verifiable with the aid of the signer, a dishonest signer may disavow a genuine document. Undeniable signatures solve this problem by adding a new component called the disavowal protocol in addition to the normal components of signature and verification. Disavowal protocol can prevent a dishonest signer from disavowing a valid signature. The convertible undeniable signatures allow the signer to convert given signatures into universally verifiable signatures. To combine all the above characteristics, Huang et al. proposed a convertible undeniable partially blind signature scheme at IEEE AINA 2005. They extended the concept of partially blind signature to the convertible undeniable partially blind signature, in which only the signer can verify given signatures on messages, and confirm/disavow the validity/invalidity of given signatures, and convert them into universally verifiable signatures. However, their scheme is not secure. In this paper, we present an attack on the convertible undeniable partially blind signature scheme. | |
dc.publisher | Springer-Verlag | |
dc.relation.uri | http://www.springer.com | |
dc.subject | Security protocol | |
dc.subject | Partially blind signature | |
dc.subject | Blind signature | |
dc.subject | Attack | |
dc.subject | secure | |
dc.subject | information systems | |
dc.subject | security | |
dc.subject | Convertible undeniable signature | |
dc.title | An attack on undeniable partially blind signatures | |
dc.type | Conference Paper | |
dcterms.source.startPage | 139 | |
dcterms.source.endPage | 146 | |
dcterms.source.title | Proceedings of the First European Conference on Computer Network Defence (EC2ND) | |
dcterms.source.series | Proceedings of the First European Conference on Computer Network Defence (EC2ND) | |
dcterms.source.conference | First European Conference on Computer Network Defence (EC2ND) | |
dcterms.source.conference-start-date | Dec 15 2005 | |
dcterms.source.conferencelocation | Glamorgan, UK | |
dcterms.source.place | London, UK | |
curtin.note |
EC2ND 2005 | |
curtin.note |
Proceedings of the First European Conference on Computer Network Defence | |
curtin.note |
School of Computing, University of Glamorgan, Wales UK | |
curtin.note |
Blyth, Andrew (Ed.) 2006, IX, 296 p. 123 illus., Softcover | |
curtin.note |
ISBN: 978-1-84628-311-6 | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.identifier | EPR-731 | |
curtin.accessStatus | Fulltext not available | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |