Skip to main content
placeholder image

Convertible undeniable proxy signatures: security models and efficient construction

Journal Article


Abstract


  • In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/Disavowal protocol with the help of the signer. Convertible undeniable signatures provide the flexibility that a signer can convert an undeniable signature into publicly verifiable one. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former when the former is not available. Proxy signatures have found numerous practical applications in ubiquitous computing, distributed systems, mobile agent applications, etc. In this paper, we propose the first convertible undeniable proxy signature scheme with rigorously proven security. The properties of Unforgeability, Invisibility and Soundness in the context of convertible undeniable proxy signatures are also clearly defined. The security of our construction is formally proven in the random oracle models, based on some natural complexity assumptions.

UOW Authors


  •   Wu, Wei (external author)
  •   Mu, Yi (external author)
  •   Susilo, Willy
  •   Huang, Xinyi (external author)

Publication Date


  • 2007

Citation


  • Wu, W., Mu, Y., Susilo, W. & Huang, X. (2007). Convertible undeniable proxy signatures: security models and efficient construction. S. Kim, H. Lee & M. Yung In International Workshop on Information Security Applications, August 27-29, Jeju Island, Korea. Lecture Notes in Computer Science, 4867 (August), 16-29.

Scopus Eid


  • 2-s2.0-38549097708

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3073

Has Global Citation Frequency


Number Of Pages


  • 13

Start Page


  • 16

End Page


  • 29

Volume


  • 4867

Issue


  • August

Place Of Publication


  • Berlin

Abstract


  • In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/Disavowal protocol with the help of the signer. Convertible undeniable signatures provide the flexibility that a signer can convert an undeniable signature into publicly verifiable one. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former when the former is not available. Proxy signatures have found numerous practical applications in ubiquitous computing, distributed systems, mobile agent applications, etc. In this paper, we propose the first convertible undeniable proxy signature scheme with rigorously proven security. The properties of Unforgeability, Invisibility and Soundness in the context of convertible undeniable proxy signatures are also clearly defined. The security of our construction is formally proven in the random oracle models, based on some natural complexity assumptions.

UOW Authors


  •   Wu, Wei (external author)
  •   Mu, Yi (external author)
  •   Susilo, Willy
  •   Huang, Xinyi (external author)

Publication Date


  • 2007

Citation


  • Wu, W., Mu, Y., Susilo, W. & Huang, X. (2007). Convertible undeniable proxy signatures: security models and efficient construction. S. Kim, H. Lee & M. Yung In International Workshop on Information Security Applications, August 27-29, Jeju Island, Korea. Lecture Notes in Computer Science, 4867 (August), 16-29.

Scopus Eid


  • 2-s2.0-38549097708

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3073

Has Global Citation Frequency


Number Of Pages


  • 13

Start Page


  • 16

End Page


  • 29

Volume


  • 4867

Issue


  • August

Place Of Publication


  • Berlin