Skip to main content
placeholder image

Formal Definition and Construction of Nominative Signature

Journal Article


Abstract


  • Since the introduction of nominative signature in 1996, there

    are three problems that have still not been solved. First, there is no convincing

    application proposed; second, there is no formal security model

    available; and third, there is no proven secure scheme constructed, given

    that all the previous schemes have already been found flawed. In this

    paper, we give positive answers to these problems. First, we illustrate

    that nominative signature is a better tool for building user certification

    systems which were originally implemented using universal designatedverifier

    signature. Second, we propose a formal definition and adversarial

    model for nominative signature. Third, we show that Chaums undeniable

    signature can be transformed to an efficient nominative signature

    by simply using a standard signature. The security of our transformation

    can be proven under the standard number-theoretic assumption

UOW Authors


  •   Liu, Dennis Y.W.. (external author)
  •   Wong, Duncan S. (external author)
  •   Huang, Xinyi (external author)
  •   Wang, Guilin (external author)
  •   Huang, Qiong (external author)
  •   Mu, Yi (external author)
  •   Susilo, Willy

Publication Date


  • 2007

Citation


  • Liu, D. Y.W.., Wong, D. S., Huang, X., Wang, G., Huang, Q., Mu, Y. & Susilo, W. (2007). Formal Definition and Construction of Nominative Signature. H. Imai, S. Qing & G. Wang In International Conference on Information and Communications Security, 12-15 December, Zhengzhou, China. Lecture notes in computer science, 4861 57-68.

Scopus Eid


  • 2-s2.0-38149016878

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1839

Has Global Citation Frequency


Number Of Pages


  • 11

Start Page


  • 57

End Page


  • 68

Volume


  • 4861

Place Of Publication


  • Berlin Heidelberg

Abstract


  • Since the introduction of nominative signature in 1996, there

    are three problems that have still not been solved. First, there is no convincing

    application proposed; second, there is no formal security model

    available; and third, there is no proven secure scheme constructed, given

    that all the previous schemes have already been found flawed. In this

    paper, we give positive answers to these problems. First, we illustrate

    that nominative signature is a better tool for building user certification

    systems which were originally implemented using universal designatedverifier

    signature. Second, we propose a formal definition and adversarial

    model for nominative signature. Third, we show that Chaums undeniable

    signature can be transformed to an efficient nominative signature

    by simply using a standard signature. The security of our transformation

    can be proven under the standard number-theoretic assumption

UOW Authors


  •   Liu, Dennis Y.W.. (external author)
  •   Wong, Duncan S. (external author)
  •   Huang, Xinyi (external author)
  •   Wang, Guilin (external author)
  •   Huang, Qiong (external author)
  •   Mu, Yi (external author)
  •   Susilo, Willy

Publication Date


  • 2007

Citation


  • Liu, D. Y.W.., Wong, D. S., Huang, X., Wang, G., Huang, Q., Mu, Y. & Susilo, W. (2007). Formal Definition and Construction of Nominative Signature. H. Imai, S. Qing & G. Wang In International Conference on Information and Communications Security, 12-15 December, Zhengzhou, China. Lecture notes in computer science, 4861 57-68.

Scopus Eid


  • 2-s2.0-38149016878

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1839

Has Global Citation Frequency


Number Of Pages


  • 11

Start Page


  • 57

End Page


  • 68

Volume


  • 4861

Place Of Publication


  • Berlin Heidelberg