Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Weaknesses of undeniable signature schemes
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Efficient group signatures in the standard model
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Hi-index | 0.00 |
The weaknesses that are the subject of [DY 91] have already been addressed in the published literature [C 90 & CvA 89]. The main class of these weaknesses consists of ways of cheating undeniable signatures; but these ways are shown here to themselves be "weak." Specifically, a cheater using them can double-cross the other cheaters, to the extent that the original ways of cheating are rendered useless. The remaining cited weaknesses are re-statements of, or variations on, some previously observed blinding techniques [CvA 89]. These techniques allow advantages in some applications when desired, but are also easily excluded when not desired.