×

Undeniable signature systems

  • US 4,947,430 A
  • Filed: 11/23/1987
  • Issued: 08/07/1990
  • Est. Priority Date: 11/23/1987
  • Status: Expired due to Term
First Claim
Patent Images

1. A cryptographic method for forming and checking undeniable signatures where the signatures are called "undeniable" because they can be verified in a protocol between a signing party and a checking party and the signing party is unable to conduct the protocol improperly so as to "deny" the validity of a valid undeniable signature previously issued by the signing party without such improper denial giving at least a probability with at least a known lower bound that the checking party will learn that the signing party has conducted the protocol improperly, the method comprising the steps of:

  • forming an undeniable signature from an unsigned message by said signing party using a private key corresponding to a public key, and the resulting undeniable signature being issued to at least one party other than the signing party;

    forming at least one challenge by a checking party using a challenge key known to said checking party, the challenge key being unknown to said signing party at least until a response by said signing party is committed to by the signing party, and the challenge at least partially depending on at least one member of a pair having a purported undeniable signature and said unsigned message, and supplying the at least one challenge to said signing party;

    transforming at least one said challenge received by said signing party using knowledge of said private key and returning to said checking party the result of the transformation as said response; and

    checking at least one said response received by said checking party using values at least depending on said challenge key, to give at least a probability having a known lower bound that the signing party is unable to prevent the checking party from distinguishing between three cases;

    (a) that said purported undeniable signature is a valid undeniable signature corresponding both to said public key and to said unsigned message, (b) that the purported undeniable signature is not a valid undeniable signature corresponding both to the public key and to the unsigned message, and (c) that the response by the signing party is an improper response.

View all claims
  • 19 Assignments
Timeline View
Assignment View
    ×
    ×