AbstractWe present a new model for undeniable signatures: fair-anonymous undeniable signatures. This protocol can not only preserve the privacy of the signer (i.e. anonymity) but also track the illegal utilization of the valid signatures. In addition, our model prevents the trusted centre from forging a valid signature for any signer. KeywordsCryptography, Fair Anonymity, Information Security, RSA Signatures, Undeniable Signatures. I. INTRODUCTION s the Information Technology’s presence gets larger and more pronounced, we can expect to see some changes. Many of those changes have already started to happen. The most attractive characteristics for those changes are: Multi-user electronic commerce is more and more concerning the issue of security and privacy. Various solutions were proposed for this issue, for example, encryption technique, digital signature technique (including general signature scheme, blind signature scheme, undeniable signature scheme, group signature scheme, etc.), and other cryptographic techniques [16], as well as steganography techniques. Anonymity and fair anonymity are one of the important goals achieved by some of these techniques. Undeniable signatures are one of the techniques, which can help to achieve anonymity and fair anonymity. Undeniable signatures, first devised by David Chaum and Hans van Antwerpen [4], are non self-authenticating (i.e. non universal verifiability) signature schemes, where signatures can only be verified with the consent of the signer (e.g. a company). However, if a signature is only verifiable with the aid of a signer, a dishonest signer may refuse to authenticate a genuine document. Undeniable signatures solve this problem by adding a new component called the denial protocol in addition Manuscript received November 3, 2004. This work was supported in part by a research fellowship and ARC funding at CEEBI and Curtin, and a research funding of Hong Kong Research Grant Council. Song Han is with the School of Information Systems and the Department of Computing, Curtin University of Technology (e-mail: hans@cs.curtin.edu.au). He will join the Centre for Extended Enterprises and Business Intelligence. Elizabeth Chang is with the School of Information Systems, Curtin University of Technology. Winson Yeung, Xiaotie Deng are with the Department of Computer Science, City University of Hong Kong . Li Gao is currently with the College of Applied Science, Beijing University of Technology. to the normal components of signature and verification. That is, undeniable signatures have two distinctive features: 1. The verification process is interactive, so the signer can limit who (e.g. payee) can verify their signature. 2. A disavowal protocol, that is a cryptographic protocol which will allow them to prove that a given signature is a forgery. The first property means that a signer can allow only those who are authorized to access the document to verify their signature. If the document were to be leaked to a third party, the third party would be unable to verify that the signature is genuine. However because of this property it means that the signer may deny a signature which was valid. To prevent this we have the second property, a method to prove that a given signature is a forgery. The protection of signatures from being verified without the permission of the signer is not only justified by confidentiality and privacy concerns but it also opens a wide range of applications where verifying a signature is a valuable operation by itself. A typical scenario is the case of a software company that uses signature confirmation as a means to provide a proof of authenticity of their software to authorized (e.g., paying) customers only. This example illustrates the core observation on which the notion of undeniable signatures stands: verification of signatures, and not only their generation, is a valuable resource to be protected. So far, various undeniable signatures have been created, [2]-[5], [7], [9], [11]-[13], [15], [17]. Those schemes provided undeniability analysis (including completeness, soundness, and zero-knowledge). However, it will be more interesting if anonymity for undeniable signatures are proposed in today's electronic commerce. Galbraith and Mao [7] constructed such a scheme and provided the anonymity analysis. However, their scheme only proposed perfect anonymity. That is, their scheme always preserves the privacy of signers in any case and the signers have perfect privacy. Therefore, users may ask such an interesting problem: how can we identify the signer who did anything illegal by taking advantage of the undeniable signature scheme. In this paper, we solve the above problem. Moreover, the proposed undeniable signature scheme has the significant properties of undeniability and fair anonymity, simultaneously. In addition, we also have improved the result reported in [18]. In our scheme, a trusted center is involved. In practical scenario, a bank or a government will play the role Practical Fair Anonymous Undeniable Signatures Song Han, Elizabeth Chang, Xiaotie Deng, Li Gao and Winson Yeung A INTERNATIONAL JOURNAL OF SIGNAL PROCESSING VOLUME 1 NUMBER 4 2004 ISSN:1304-4494 IJSP VOLUME 1 NUMBER 4 2004 ISSN:1304-4494 291 COPYRIGHT © 2004 ENFORMATIKA