For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
Abuses of Undeniable Signatures and Their Countermeasures
Kazuo OHTA Tatsuaki OKAMOTO Atsushi FUJIOKA
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/08/25
Print ISSN: 0916-8508
Type of Manuscript: Special Section PAPER (Special Issue on Cryptography and Information Security)
Full Text: PDF(384.9KB)>>
This paper describes an attack that allows plural verifiers to check the validity of a signature simultaneously in Chaum's zero knowledge undeniable signature scheme, where if a malicious person takes part in the attack procedure as one verifier, the non-transitivity of a signature is suspect, and also proposes countermeasures to the attack.