Paper Title:
Identity-Based Convertible Limited Verifier Signature Scheme in the Standard Model
  Abstract

A convertible limited verifier signature (CLVS) can be used to solve conflicts between authenticity and privacy in the digital signatures. In a CLVS scheme, the signature can be verified by a limited verifier. When necessary, the limited verifier can provide a proof to convince a judge that the signer has indeed generated the signature. However, the judge cannot transfer this proof to convince any other party. Also, the limited verifier signature should be converted into an ordinary one for public verification if required. In this paper, we proposed firstly identity-based converible limited verifier signature scheme in the standard model. We give the security proofs of our scheme and show that Our scheme achieved the desired security notions in the standard model (without random oracle).

  Info
Periodical
Edited by
Zhixiang Hou
Pages
599-602
DOI
10.4028/www.scientific.net/AMM.48-49.599
Citation
X. Q. Shen, Y. Ming, "Identity-Based Convertible Limited Verifier Signature Scheme in the Standard Model", Applied Mechanics and Materials, Vols. 48-49, pp. 599-602, 2011
Online since
February 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

  | Authors: Xiu Ying Yu, Da Ke He
Chapter 3: Computational Methods for Engineering
Abstract:Multi-signcryption can meet the requirement of message signcryption with muti-participant. Since the existing identity-based...
198
Authors: Hui Meng, Xu Qian
Chapter 2: Network & Control
Abstract:Proxy multi-signature is an extension of the basic proxy signature primitive, and permits two or more entities to delegate their signing...
217
Authors: Hong Zhen Du, Mei Juan Huang
Chapter 18: Computer Applications in Industry and Engineering
Abstract:We construct an efficient and novel identity-based strong designated verifier signature (IBSDVS) scheme based on bilinear pairings, and...
2870
Authors: Qiu Na Niu
Chapter 12: Information Technologies and Engineering Management in Industry
Abstract:An efficient identity-based (or ID-based) multi-signature (IBMS) scheme from RSA is proposed based on a variation of the Fiat-Shamir...
1808