### Nominative Signature: Application, Security Model and Construction

Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, and Willy Susilo

##### Abstract

Since the introduction of nominative signature in 1996, there have been only a few schemes proposed and all of them have already been found flawed. In addition, there is no formal security model defined. Even more problematic, there is no convincing application proposed. Due to these problems, the research of nominative signature has almost stalled and it is unknown if a secure nominative signature scheme can be built or there exists an application for it. In this paper, we give positive answers to these problems. First, we illustrate that nominative signature is a better tool for building user certification systems which are originally believed to be best implemented using a universal designated-verifier signature. Second, we propose a formal definition and a rigorous set of adversarial models for nominative signature. Third, we show that Chaum's undeniable signature can be transformed efficiently to a nominative signature and prove its security.

Available format(s)
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
digital signaturenominative signatureundeniable signature
Contact author(s)
duncan @ cityu edu hk
History
2007-03-01: revised
See all versions
Short URL
https://ia.cr/2007/069

CC BY

BibTeX

@misc{cryptoeprint:2007/069,
author = {Dennis Y.  W.  Liu and Duncan S.  Wong and Xinyi Huang and Guilin Wang and Qiong Huang and Yi Mu and Willy Susilo},
title = {Nominative Signature: Application, Security Model and Construction},
howpublished = {Cryptology ePrint Archive, Paper 2007/069},
year = {2007},
note = {\url{https://eprint.iacr.org/2007/069}},
url = {https://eprint.iacr.org/2007/069}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.