Abstract
D. Chaum and H. van Antwerpen first introduced the concept of an undeniable signature scheme where the verification step is verified with the signer’s co-operation. In this paper, first we discuss a combination of Discrete Logarithm Problem (DLP) and Conjugacy Search Problem (CSP) analysing its security. Then we propose an undeniable signature scheme in a non-abelian group over group ring whose security relies on difficulty of the combination of the DLP and the CSP. The complexity and security of our proposed scheme has also been discussed.
Similar content being viewed by others
Notes
We can choose the set of positive integers of cardinality p (where p may or may not be prime) in place of finite cyclic group. \({\mathbb {Z}}^{*}_{p}\) is used only for exploring the DLCSP in an undeniable signature scheme.
The choice of \(a\in {\mathbb {Z}}^{*}_{p}~\text {and}~z\in H\) should be such that \(z^{a}\ne 1.\)
References
Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapmen & Hall/CRC Press, Taylor & Francis, London (2007)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-key cryptosystem. Commun. ACM 21, 120–126 (1978)
Stinson, D.R.: Cryptography Theory and Practice, Second Indian Reprint. Chapman & Hall/CRC Press, London (2013)
Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Advances in Cryptology-CRYPTO’89. Lecture Notes in Computer Science, vol. 435, pp. 212–216 (1990)
Gennaro, R., Krawczyk, H., Rabin, T.: RSA-based undeniable signatures. J. Cryptol. 13, 397–416 (2000)
Thomas, T., Lal, A.K.: A zero-knowledge undeniable signature scheme in non-abelian group setting. Int. J. Netw. Secur. 6, 265–269 (2008)
Chen, T.-S., Hsu, E.-T., Yu, Y.-L.: A new elliptic curve undeniable signature scheme. Int. Math. Forum 1(31), 1529–1536 (2006)
Kahrobaei, D., Khan, B.: A non-commutative generalisation of ElGamal key exchange using polycyclic groups. In: Global Telecommunication Conference, GLOBECOM, IEEE, pp. 1–5 (2006)
Sakalauskas, E., Tvarijonas, P., Raulynaitis, A.: Key agreement protocol using conjugacy search problem and discrete logarithm problem in group representation level. Informatica 18, 115–124 (2007)
Eftekhari, M.: A Diffie–Hellman key exchange protocol using matrices over non-commutative rings. Groups Complex. Cryptol. 4, 167–176 (2012)
Passman, D.S.: The Algebraic Structure of Group Ring. Wiley, New York (1977)
Myasnikov, A., Shpilrain, V., Ushakov, A.: Non-commutative Cryptography and Complexity of Group-Theoretic Problems, vol. 177. American Mathematical Society, Providence (2011)
Kahrobaei, D., Koupparis, C., Shpilrain, V.: Public key exchange using matrices over group ring. Cryptology eprint Archive Report 2013/114. https://eprint.iacr.org/2013/114
Dornhoff, L.: Group Representation Theory (Part A). Marcel Dekker, New York (1971)
Koblitz, N.: A Course in Number Theory and Cryptography, 2nd edn. Springer, New York (1994)
Acknowledgments
The authors would like to express their sincere thanks to the reviewers of the manuscript for their valuable comments and suggestions which were very useful to improve the manuscript. The authors are grateful to the editorial board of the journal for their support and co-operation. The authors are also thankful to the Director SAG for allowing us to pursue this work.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Goel, N., Gupta, I., Dubey, M.K. et al. Undeniable signature scheme based over group ring. AAECC 27, 523–535 (2016). https://doi.org/10.1007/s00200-016-0293-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00200-016-0293-8