A Generic Construction for Universally-Convertible ... - Semantic Scholar

0 downloads 0 Views 768KB Size Report
What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution Conclusion. Outline. What is ...
What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

A Generic Construction for Universally-Convertible Undeniable Signatures Xinyi Huang

Yi Mu

Willy Susilo

Wei Wu

Centre for Computer and Information Security Research School of Computer Science & Software Engineering (SCSSE) University of Wollongong, Australia

CANS 2007 8-10 December 2007, Singapore

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline What is (Convertible) Undeniable Signature? Undeniable Signature Convertible Undeniable Signature Security Notions of Universally-Convertible Undeniable Signatures Outline of Universally-Convertible Undeniable Signatures Security Requirements Our Contribution Generic Construction Analysis Conclusion

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline What is (Convertible) Undeniable Signature? Undeniable Signature Convertible Undeniable Signature Security Notions of Universally-Convertible Undeniable Signatures Outline of Universally-Convertible Undeniable Signatures Security Requirements Our Contribution Generic Construction Analysis Conclusion

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline What is (Convertible) Undeniable Signature? Undeniable Signature Convertible Undeniable Signature Security Notions of Universally-Convertible Undeniable Signatures Outline of Universally-Convertible Undeniable Signatures Security Requirements Our Contribution Generic Construction Analysis Conclusion

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline What is (Convertible) Undeniable Signature? Undeniable Signature Convertible Undeniable Signature Security Notions of Universally-Convertible Undeniable Signatures Outline of Universally-Convertible Undeniable Signatures Security Requirements Our Contribution Generic Construction Analysis Conclusion

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline What is (Convertible) Undeniable Signature? Undeniable Signature Convertible Undeniable Signature Security Notions of Universally-Convertible Undeniable Signatures Outline of Universally-Convertible Undeniable Signatures Security Requirements Our Contribution Generic Construction Analysis Conclusion

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Undeniable Signature

Undeniable signature is a concept introduced by Chaum and van Antwerpen in Cypto’89 [ChaumAntwerpen, 1989]. • Undeniable signatures are not publicly verifiable. • The validity or invalidity of an undeniable signature can

only be verified with the help of the signer. • Confirmation and Disavowal Protocols

[ChaumAntwerpen, 1989] Chaum, D., Antwerpen, H.v. Undeniable Signatures CRYPTO’89, LNCS 435, 212–216

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Undeniable Signature

Undeniable signature is a concept introduced by Chaum and van Antwerpen in Cypto’89 [ChaumAntwerpen, 1989]. • Undeniable signatures are not publicly verifiable. • The validity or invalidity of an undeniable signature can

only be verified with the help of the signer. • Confirmation and Disavowal Protocols

[ChaumAntwerpen, 1989] Chaum, D., Antwerpen, H.v. Undeniable Signatures CRYPTO’89, LNCS 435, 212–216

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Undeniable Signature

Undeniable signature is a concept introduced by Chaum and van Antwerpen in Cypto’89 [ChaumAntwerpen, 1989]. • Undeniable signatures are not publicly verifiable. • The validity or invalidity of an undeniable signature can

only be verified with the help of the signer. • Confirmation and Disavowal Protocols

[ChaumAntwerpen, 1989] Chaum, D., Antwerpen, H.v. Undeniable Signatures CRYPTO’89, LNCS 435, 212–216

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline What is (Convertible) Undeniable Signature? Undeniable Signature Convertible Undeniable Signature Security Notions of Universally-Convertible Undeniable Signatures Outline of Universally-Convertible Undeniable Signatures Security Requirements Our Contribution Generic Construction Analysis Conclusion

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Convertible Undeniable Signature

The concept of convertible undeniable signature was introduced in [Boyar et al., 1990]. • The “Convertible" refers to the ability of the signer to

convert one or more his undeniable signatures into publicly verifiable. [Boyar et al., 1990] Boyar, J., Chaum, D., Damgård, I.B., Pedersen. T.P. Convertible Undeniable Signatures. CRYPTO’90: LNCS 537. 189–205

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Convertible Undeniable Signature

The concept of convertible undeniable signature was introduced in [Boyar et al., 1990]. • The “Convertible" refers to the ability of the signer to

convert one or more his undeniable signatures into publicly verifiable. [Boyar et al., 1990] Boyar, J., Chaum, D., Damgård, I.B., Pedersen. T.P. Convertible Undeniable Signatures. CRYPTO’90: LNCS 537. 189–205

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Selectively Convert “Convert" in the undeniable signatures has two types: Selectively Convert and Universally Convert.

Selectively Convert • Signer can generate a selective proof for an undeniable

signature. • One can check the validity of this signature using the proof

and signer’s public key. • The validity of other undeniable signatures remains

unknown and can only be verified via the Confirmation (or, Disavowal) protocol.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Selectively Convert “Convert" in the undeniable signatures has two types: Selectively Convert and Universally Convert.

Selectively Convert • Signer can generate a selective proof for an undeniable

signature. • One can check the validity of this signature using the proof

and signer’s public key. • The validity of other undeniable signatures remains

unknown and can only be verified via the Confirmation (or, Disavowal) protocol.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Selectively Convert “Convert" in the undeniable signatures has two types: Selectively Convert and Universally Convert.

Selectively Convert • Signer can generate a selective proof for an undeniable

signature. • One can check the validity of this signature using the proof

and signer’s public key. • The validity of other undeniable signatures remains

unknown and can only be verified via the Confirmation (or, Disavowal) protocol.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Selectively Convert “Convert" in the undeniable signatures has two types: Selectively Convert and Universally Convert.

Selectively Convert • Signer can generate a selective proof for an undeniable

signature. • One can check the validity of this signature using the proof

and signer’s public key. • The validity of other undeniable signatures remains

unknown and can only be verified via the Confirmation (or, Disavowal) protocol.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Universally Convert

• A signer can generate a selective proof for an undeniable

signature. • A signer can also generate a universal proof for all his

undeniable signatures. • All the undeniable signatures are publicly verifiable: one

can check the validity of any signature using the universal proof and signer’s public key.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Motivation

• Most constructions of undeniable signatures are

selectively-convertible. • Not all of them are universally-convertible. • How to obtain a universally-convertible undeniable

signature scheme from selectively convertible undeniable signature scheme?

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Contributions

We propose a generic construction for universally-convertible undeniable signatures from • A strongly existentially unforgeable classic signature

scheme, • A selectively-convertible undeniable signature scheme, • A collision-resistant hash function.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Applications of Our Construction 1. Pairing-free universally-convertible undeniable signature in standard model: Apply our construction to Kurosawa-Takagi’s scheme [Kurosawa-Takagi, 2006]. 2. Fix the flaws in some known constructions [Boyar et al., 1990]. 3. Apply to other variants of undeniable signatures: designated confirmer signature, directed signature. K. Kurosawa and T. Takagi. New Approach for Selectively Convertible Undeniable Signature Schemes. ASIACRYPT 2006, LNCS 4284, pp. 428-443.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline What is (Convertible) Undeniable Signature? Undeniable Signature Convertible Undeniable Signature Security Notions of Universally-Convertible Undeniable Signatures Outline of Universally-Convertible Undeniable Signatures Security Requirements Our Contribution Generic Construction Analysis Conclusion

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline of Undeniable Signature An ID-based undeniable signature scheme is defined as:

1. UC-US-Setup • Input: ` • Output: UC-US-Params

2. US-KeyGen • Input: UC-US-Params • Output: (PKUC , SKUC )

3. UC-US-Sign • Input: SKUC , m • Output: σUC

4. UC-US-Verify • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: {0,1}.

5. Confirmation/Disavowal Protocol • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: Trans

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline of Undeniable Signature An ID-based undeniable signature scheme is defined as:

1. UC-US-Setup • Input: ` • Output: UC-US-Params

2. US-KeyGen • Input: UC-US-Params • Output: (PKUC , SKUC )

3. UC-US-Sign • Input: SKUC , m • Output: σUC

4. UC-US-Verify • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: {0,1}.

5. Confirmation/Disavowal Protocol • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: Trans

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline of Undeniable Signature An ID-based undeniable signature scheme is defined as:

1. UC-US-Setup • Input: ` • Output: UC-US-Params

2. US-KeyGen • Input: UC-US-Params • Output: (PKUC , SKUC )

3. UC-US-Sign • Input: SKUC , m • Output: σUC

4. UC-US-Verify • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: {0,1}.

5. Confirmation/Disavowal Protocol • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: Trans

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline of Undeniable Signature An ID-based undeniable signature scheme is defined as:

1. UC-US-Setup • Input: ` • Output: UC-US-Params

2. US-KeyGen • Input: UC-US-Params • Output: (PKUC , SKUC )

3. UC-US-Sign • Input: SKUC , m • Output: σUC

4. UC-US-Verify • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: {0,1}.

5. Confirmation/Disavowal Protocol • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: Trans

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline of Undeniable Signature An ID-based undeniable signature scheme is defined as:

1. UC-US-Setup • Input: ` • Output: UC-US-Params

2. US-KeyGen • Input: UC-US-Params • Output: (PKUC , SKUC )

3. UC-US-Sign • Input: SKUC , m • Output: σUC

4. UC-US-Verify • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: {0,1}.

5. Confirmation/Disavowal Protocol • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: Trans

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline of Undeniable Signature An ID-based undeniable signature scheme is defined as:

1. UC-US-Setup • Input: ` • Output: UC-US-Params

2. US-KeyGen • Input: UC-US-Params • Output: (PKUC , SKUC )

3. UC-US-Sign • Input: SKUC , m • Output: σUC

4. UC-US-Verify • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: {0,1}.

5. Confirmation/Disavowal Protocol • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: Trans

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline of Universally-Convertible Undeniable Signature 6. UC-US-SConvert • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: SelectiveProof

7. Selectively Verify • Input: UC-US-Params,

PKUC , (M, σUC ), SelectiveProof • Output: decision

d ∈ {Acc, Rej}.

8. Universally Convert • Input: UC-US-Params,

SKUC • Output:

UniversalProof{PKUC }

9. Universally Verify • Input: UC-US-Params,

PKUC , (M, σUC ), UniversalProof{PKUC } • Output: decision

d ∈ {Acc, Rej}.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline of Universally-Convertible Undeniable Signature 6. UC-US-SConvert • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: SelectiveProof

7. Selectively Verify • Input: UC-US-Params,

PKUC , (M, σUC ), SelectiveProof • Output: decision

d ∈ {Acc, Rej}.

8. Universally Convert • Input: UC-US-Params,

SKUC • Output:

UniversalProof{PKUC }

9. Universally Verify • Input: UC-US-Params,

PKUC , (M, σUC ), UniversalProof{PKUC } • Output: decision

d ∈ {Acc, Rej}.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline of Universally-Convertible Undeniable Signature 6. UC-US-SConvert • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: SelectiveProof

7. Selectively Verify • Input: UC-US-Params,

PKUC , (M, σUC ), SelectiveProof • Output: decision

d ∈ {Acc, Rej}.

8. Universally Convert • Input: UC-US-Params,

SKUC • Output:

UniversalProof{PKUC }

9. Universally Verify • Input: UC-US-Params,

PKUC , (M, σUC ), UniversalProof{PKUC } • Output: decision

d ∈ {Acc, Rej}.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline of Universally-Convertible Undeniable Signature 6. UC-US-SConvert • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: SelectiveProof

7. Selectively Verify • Input: UC-US-Params,

PKUC , (M, σUC ), SelectiveProof • Output: decision

d ∈ {Acc, Rej}.

8. Universally Convert • Input: UC-US-Params,

SKUC • Output:

UniversalProof{PKUC }

9. Universally Verify • Input: UC-US-Params,

PKUC , (M, σUC ), UniversalProof{PKUC } • Output: decision

d ∈ {Acc, Rej}.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline of Universally-Convertible Undeniable Signature 6. UC-US-SConvert • Input: UC-US-Params,

SKUC , (M, σUC ) • Output: SelectiveProof

7. Selectively Verify • Input: UC-US-Params,

PKUC , (M, σUC ), SelectiveProof • Output: decision

d ∈ {Acc, Rej}.

8. Universally Convert • Input: UC-US-Params,

SKUC • Output:

UniversalProof{PKUC }

9. Universally Verify • Input: UC-US-Params,

PKUC , (M, σUC ), UniversalProof{PKUC } • Output: decision

d ∈ {Acc, Rej}.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline What is (Convertible) Undeniable Signature? Undeniable Signature Convertible Undeniable Signature Security Notions of Universally-Convertible Undeniable Signatures Outline of Universally-Convertible Undeniable Signatures Security Requirements Our Contribution Generic Construction Analysis Conclusion

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Completeness and Soundness Completeness • Valid signatures can always be proved valid. • Invalid signatures can always be proved invalid

Soundness • A malicious signer himself cannot convince a verifier V

that a valid signature is invalid. • A malicious signer himself cannot convince a verifier V

that an invalid signature is valid.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Completeness and Soundness Completeness • Valid signatures can always be proved valid. • Invalid signatures can always be proved invalid

Soundness • A malicious signer himself cannot convince a verifier V

that a valid signature is invalid. • A malicious signer himself cannot convince a verifier V

that an invalid signature is valid.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Non-Transferability and Unforgeability Non-Transferability of the Confirmation/Disavowal Protocol • The transcript Trans wrt the designated verifier V can only

convince V . • No one else could be convinced by this Trans even if V

shares all his secret information (including his secret key) with this party.

Unforgeability The adversary, equipped with the knowledge of the selective proofs and universal proof, cannot generate a valid signature of a new message m.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Non-Transferability and Unforgeability Non-Transferability of the Confirmation/Disavowal Protocol • The transcript Trans wrt the designated verifier V can only

convince V . • No one else could be convinced by this Trans even if V

shares all his secret information (including his secret key) with this party.

Unforgeability The adversary, equipped with the knowledge of the selective proofs and universal proof, cannot generate a valid signature of a new message m.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Invisibility and Non-Impersonation Invisibility Given a message-signature pair (M, σUC ) and the public key PKUC , it is difficult to decide whether or not it is a valid message-signature pair.

Non-Impersonation 1. It should be difficult for an impersonator to generate the selective proof for a message-signature pair. 2. It should be difficult for an impersonator to generate the universal proof. 3. It should be difficult for an impersonator to generate a transcript of the Confirmation (Disavowal) protocol.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Invisibility and Non-Impersonation Invisibility Given a message-signature pair (M, σUC ) and the public key PKUC , it is difficult to decide whether or not it is a valid message-signature pair.

Non-Impersonation 1. It should be difficult for an impersonator to generate the selective proof for a message-signature pair. 2. It should be difficult for an impersonator to generate the universal proof. 3. It should be difficult for an impersonator to generate a transcript of the Confirmation (Disavowal) protocol.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Invisibility and Non-Impersonation Invisibility Given a message-signature pair (M, σUC ) and the public key PKUC , it is difficult to decide whether or not it is a valid message-signature pair.

Non-Impersonation 1. It should be difficult for an impersonator to generate the selective proof for a message-signature pair. 2. It should be difficult for an impersonator to generate the universal proof. 3. It should be difficult for an impersonator to generate a transcript of the Confirmation (Disavowal) protocol.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Invisibility and Non-Impersonation Invisibility Given a message-signature pair (M, σUC ) and the public key PKUC , it is difficult to decide whether or not it is a valid message-signature pair.

Non-Impersonation 1. It should be difficult for an impersonator to generate the selective proof for a message-signature pair. 2. It should be difficult for an impersonator to generate the universal proof. 3. It should be difficult for an impersonator to generate a transcript of the Confirmation (Disavowal) protocol.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Invisibility and Non-Impersonation Invisibility Given a message-signature pair (M, σUC ) and the public key PKUC , it is difficult to decide whether or not it is a valid message-signature pair.

Non-Impersonation 1. It should be difficult for an impersonator to generate the selective proof for a message-signature pair. 2. It should be difficult for an impersonator to generate the universal proof. 3. It should be difficult for an impersonator to generate a transcript of the Confirmation (Disavowal) protocol.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline What is (Convertible) Undeniable Signature? Undeniable Signature Convertible Undeniable Signature Security Notions of Universally-Convertible Undeniable Signatures Outline of Universally-Convertible Undeniable Signatures Security Requirements Our Contribution Generic Construction Analysis Conclusion

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Generic Construction: Setup

• UC-US-Setup: UC-US-Params consists of 1. CS-Params: parameters of a strongly unforgeable classic signature scheme; 2. SC-US-Params: parameters of a selectively undeniable signature scheme; 3. Hk : collision-resistent hash function.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Generic Construction: Key Generation

• UC-US-KeyGen: Each signer has two public-secret key

pairs: (PKCS , SKCS ) and (PKSC , SKSC ) where 1. (PKCS , SKCS ): key pair in the classic signature scheme. 2. (PKSC , SKSC ): key pair in the selective undeniable signature scheme.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Generic Construction: Sign and Verify

• UC-US-Sign: σUC = (σSC , σCS ) where 1. σSC : a selectively-convertible undeniable signature on the message M. 2. σCS is a classic signature on the message Hk (MkσSC kUndeniable). • UC-US-Verify: Given (M, σSC , σCS ) and the user’s secret

key, outputs Accept if both two signatures are valid.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Generic Construction: Sign and Verify

• UC-US-Sign: σUC = (σSC , σCS ) where 1. σSC : a selectively-convertible undeniable signature on the message M. 2. σCS is a classic signature on the message Hk (MkσSC kUndeniable). • UC-US-Verify: Given (M, σSC , σCS ) and the user’s secret

key, outputs Accept if both two signatures are valid.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Generic Construction: Confirmation/Disavowal Protocol

• UC-US-Confirmation (UC-US-Confirmation): Given

(M, σSC , σCS ), 1. If σcs is invalid, nothing is to be carried out between the verifier and the signer. 2. Otherwise, execute the confirmation (disavowal) protocol in the underlying selectively undeniable signatures.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Generic Construction: Selectively-Convert

• UC-US-SConvert: Given (M, σSC , σCS ) and signer’s secret

key, generate the selective-proof for the selectively convertible undeniable signature σSC • UC-US-SVerify: Given (M, σSC , σCS ) and its

selective-proof: 1. Check σCS with PKCS 2. Check σSC with its selective-proof.

Output Accept if both are valid.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Generic Construction: Universally-Convert

• UC-US-UConvert: The universal proof is SKSC , which is

the secret key of the underlying selectively-convertible undeniable signature. • UC-US-UVerify: Given (M, σSC , σCS ) and SKSC 1. Check σCS with PKCS 2. Check σSC with SKSC

Output Accept if both are valid.

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Outline What is (Convertible) Undeniable Signature? Undeniable Signature Convertible Undeniable Signature Security Notions of Universally-Convertible Undeniable Signatures Outline of Universally-Convertible Undeniable Signatures Security Requirements Our Contribution Generic Construction Analysis Conclusion

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Analysis: Strong Unforgeability Our scheme is strong unforgeable if the underlying classic signature scheme is strong unforgeable and the hash function is collision-resistent. Let (σSC , σCS ) be our undeniable signature, • If A can output a new message-signature pair of our

scheme, • then B can use A to break the strong-unforeability of the

classic signature σCS , or • break the collision-resistent of hash function H; • We do not require the unforgeability of the selectively

undeniable signature σSC .

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Analysis: Strong Unforgeability Our scheme is strong unforgeable if the underlying classic signature scheme is strong unforgeable and the hash function is collision-resistent. Let (σSC , σCS ) be our undeniable signature, • If A can output a new message-signature pair of our

scheme, • then B can use A to break the strong-unforeability of the

classic signature σCS , or • break the collision-resistent of hash function H; • We do not require the unforgeability of the selectively

undeniable signature σSC .

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Analysis: Strong Unforgeability Our scheme is strong unforgeable if the underlying classic signature scheme is strong unforgeable and the hash function is collision-resistent. Let (σSC , σCS ) be our undeniable signature, • If A can output a new message-signature pair of our

scheme, • then B can use A to break the strong-unforeability of the

classic signature σCS , or • break the collision-resistent of hash function H; • We do not require the unforgeability of the selectively

undeniable signature σSC .

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Analysis: Strong Unforgeability Our scheme is strong unforgeable if the underlying classic signature scheme is strong unforgeable and the hash function is collision-resistent. Let (σSC , σCS ) be our undeniable signature, • If A can output a new message-signature pair of our

scheme, • then B can use A to break the strong-unforeability of the

classic signature σCS , or • break the collision-resistent of hash function H; • We do not require the unforgeability of the selectively

undeniable signature σSC .

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Analysis: Strong Unforgeability Our scheme is strong unforgeable if the underlying classic signature scheme is strong unforgeable and the hash function is collision-resistent. Let (σSC , σCS ) be our undeniable signature, • If A can output a new message-signature pair of our

scheme, • then B can use A to break the strong-unforeability of the

classic signature σCS , or • break the collision-resistent of hash function H; • We do not require the unforgeability of the selectively

undeniable signature σSC .

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Analysis: Invisibility Our scheme is invisible if the underlying classic signature scheme is strong unforgeable and the selectively convertible undeniable signature scheme is invisible. For a message M and an undeniable signature (σSC , σCS )of our scheme, • If there is a distinguisher D who can tell whether or not

(σSC , σCS ) is a valid universally-convertible undeniable signature of M, then • there is another algorithm that can use D to tell whether or

not σSC is a valid selectively-convertible undeniable signature of M, under assumption that 0 : • D can not compute another valid classic signature σCS

strong-unforgeability of σCS .

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Analysis: Invisibility Our scheme is invisible if the underlying classic signature scheme is strong unforgeable and the selectively convertible undeniable signature scheme is invisible. For a message M and an undeniable signature (σSC , σCS )of our scheme, • If there is a distinguisher D who can tell whether or not

(σSC , σCS ) is a valid universally-convertible undeniable signature of M, then • there is another algorithm that can use D to tell whether or

not σSC is a valid selectively-convertible undeniable signature of M, under assumption that 0 : • D can not compute another valid classic signature σCS

strong-unforgeability of σCS .

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Analysis: Invisibility Our scheme is invisible if the underlying classic signature scheme is strong unforgeable and the selectively convertible undeniable signature scheme is invisible. For a message M and an undeniable signature (σSC , σCS )of our scheme, • If there is a distinguisher D who can tell whether or not

(σSC , σCS ) is a valid universally-convertible undeniable signature of M, then • there is another algorithm that can use D to tell whether or

not σSC is a valid selectively-convertible undeniable signature of M, under assumption that 0 : • D can not compute another valid classic signature σCS

strong-unforgeability of σCS .

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Analysis: Invisibility Our scheme is invisible if the underlying classic signature scheme is strong unforgeable and the selectively convertible undeniable signature scheme is invisible. For a message M and an undeniable signature (σSC , σCS )of our scheme, • If there is a distinguisher D who can tell whether or not

(σSC , σCS ) is a valid universally-convertible undeniable signature of M, then • there is another algorithm that can use D to tell whether or

not σSC is a valid selectively-convertible undeniable signature of M, under assumption that 0 : • D can not compute another valid classic signature σCS

strong-unforgeability of σCS .

What is (Convertible) Undeniable Signature? Security Notions of Universally-Convertible Undeniable Signatures Our Contribution

Conclusion

• We proposed a generic construction for

universally-convertible undeniable signatures. • Security is based on the underlying building blocks:

classical signature, selectively-convertible undeniable signature and collision-resistent hash.