{"title":"An efficient undeniable signature scheme using braid groups","authors":"Pratik Ranjan, H. Om","doi":"10.1109/IC3.2015.7346736","DOIUrl":null,"url":null,"abstract":"The signature schemes are used to verify the authenticity of a signature and the corresponding documents. The undeniable signature schemes are challenge and response based interactive schemes, where the active participation of signer is compulsory. These schemes are used in private communication where the confidential deals and agreements take place as a legitimate signer cannot deny his signature. In this paper, we analyze the Thomas and Lal's braid group based zero-knowledge undeniable signature scheme and show that it is insecure against the man-in-the-middle and impersonation attacks. In addition, we propose an efficient undeniable signature scheme using the braid groups that provides secrecy and authenticity of a legitimate signer. Furthermore, we show that our scheme is secure against the above mentioned attacks.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Eighth International Conference on Contemporary Computing (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2015.7346736","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The signature schemes are used to verify the authenticity of a signature and the corresponding documents. The undeniable signature schemes are challenge and response based interactive schemes, where the active participation of signer is compulsory. These schemes are used in private communication where the confidential deals and agreements take place as a legitimate signer cannot deny his signature. In this paper, we analyze the Thomas and Lal's braid group based zero-knowledge undeniable signature scheme and show that it is insecure against the man-in-the-middle and impersonation attacks. In addition, we propose an efficient undeniable signature scheme using the braid groups that provides secrecy and authenticity of a legitimate signer. Furthermore, we show that our scheme is secure against the above mentioned attacks.