DOI QR코드

DOI QR Code

Zero-Knowledge Nominative Signatures

영지식 수신자 지정 서명방식


Abstract

In this paper, we propose a new kind of signature scheme, called 'nominative signatures&, which is the dual scheme of undeniable signatures. Also we construct a zero-knowledge protocol that implements it. The new technique called 'nominative signatures' achieves these objectives: only nominee can verity the nominator(signer)'s signature and if necessary, only nominee can prove to the third party that the signature is issued to him(her) and is valid. Contraty to the undeniable signature scheme, nominative signatures are confirmed via a protocol between the nominee and the third party, so the cooperation of the nominee is necessary. That is, not a signer(nominator) but a verifier(nominee) can control the abuse of signatures - undeniable signature cannot be verified without the cooperation of the signer, so the signer controls the abuse of signatures. Our nominative signatures are very valuable for the case in which the content of signature is concerned with the verifier's privacy.

본 논문에서는 특정한 수신자만을 상대로 서명을 발행하여 수신자가 자신에게 발행된 서명을 통제 할 수 있는 - 부인 방지 서명방식의 쌍대 개념인 - 수신자 지정 서명방식을 분석하고, 이 요구 조건을 만족하는 수신자 지정 서명방식의 정의를 내린다. 특히, 안전성이 증명되는 영지식 수신자 지정 서명방식 프로토콜을 제안한다. 이러한 서명방식은 특정 수신자의 개입 없이는 그 서명을 인증할 수 없도록 함으로써 수신자의 프라이버시를 높여줄 수 있으므로 여러 가지 응용들에서 매우 유용하게 사용될 수 있을 것이다.

Keywords

References

  1. IEEE Transactions on Information Theory IT-22 New Directions in Crypotgraphy W. Diffie;M. Hellman
  2. Communicatin of the ACM A method for Obtaining Digital Signature and Public key Cryptosystems R. Rivest;A. Shamir;L. Adleman
  3. IEEE Transactions on Information Theory v.31 A Public Key Cryptosysem and a Signature Scheme Based on Discrete Logarithms T. Elgamal
  4. Advances in Cryptology - CRYPTO '89 Proceedings Efficient Signature Generation for Smart Cards C. P. Schnorr
  5. Journal of Cryptology v.4 no.3 Efficient Signature Generation for Smart Cards C. P. Schnorr
  6. Crypto'84 Identity-Based Cryptosystems and Signature Schemes A. Shamir
  7. Crypto'86 How to Prove Yourself: Practical Solution to Identification and Signature Problem A. Fiat;A. Shamir
  8. EUROCRYPT'88 A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing both Transmission and Memory L. C. Guillou;J. J. Quisquater
  9. CRYPTO'88 A Paradoxical Identity-Based Signature Scheme Resulting from Zero-Knowledge L. C. Guillou;J. J. Quisquater
  10. Proc. Crypto'89 Undeniable signature D. Chaum;H. Antwerpen
  11. Proc. Eurocrypt'90 Zero-knowledge undeniable signature D. Chaum
  12. Proc. Crypto'90 Convertible undeniable signature J. Boyar;D. Chaum;I. Damgard
  13. Proc. Crypto'90 How to utilize the randomness of zero-knowledge proofs T. Okamato;K. Ohta
  14. Proc. ICEIC'95 Nominative Signatures S. J. Kim;S. J. Park;D. H. Won
  15. 한국정보처리응용하고히 학술발표논문집 v.1 no.2 수신자 지정 서명방식에 대한 고찰 김승주;박성준;원동호
  16. 통신정보보호학회 학술발표논문집 v.4 no.1 수신자 지정 서명방식 김승주;박성준;원동호
  17. 대한전자공학회 학술발표논문집 v.18 no.1 효율적인 수신자 지정 서명방식 김승주;박성준;원동호