Some Weaknesses of "Weaknesses of Undeniable Signatures"
暂无分享,去创建一个
The weaknesses that are the subject of [DY 91] have already been addressed in the published literature [C 90 & CvA 89]. The main class of these weaknesses consists of ways of cheating undeniable signatures; but these ways are shown here to themselves be "weak." Specifically, a cheater using them can double-cross the other cheaters, to the extent that the original ways of cheating are rendered useless. The remaining cited weaknesses are re-statements of, or variations on, some previously observed blinding techniques [CvA 89]. These techniques allow advantages in some applications when desired, but are also easily excluded when not desired.
[1] David Chaum,et al. Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.
[2] Moti Yung,et al. Weaknesses of undeniable signature schemes , 1991 .
[3] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[4] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.