Consideration is given to the signature schemes of electronic messages
where correctness can be verified only in the presence of the party t
hat generated them. Correctness and security of the undeniable signatu
re schemes are proved, and algorithms for their reduction to the ordin
ary schemes of digital signature are presented.