A Novel ID-Based Strong Designated Verifier Signature Scheme

Article Preview

Abstract:

We construct an efficient and novel identity-based strong designated verifier signature (IBSDVS) scheme based on bilinear pairings, and provide the security proofs and efficiency analysis for the proposed scheme. Our IBSDVS scheme achieves higher efficiency and satisfies all the security requirements of the designated verifier signatures in identity-based cryptography.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2870-2874

Citation:

Online since:

November 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Jakobsson, K. Sako, K. R. Impaliazzo. Designated verifier proofs and their applications. In Eurocrypt 1996, LNCS 1070, Springer-Verlag, 1996, pp.143-154.

DOI: 10.1007/3-540-68339-9_13

Google Scholar

[2] S. Saeednia, S. Kremer, O. Markovitch. An efficient strong designated verifier signature scheme. CICS 2003, LNCS 2971, Springer-Verlag, 2003, pp.40-54.

DOI: 10.1007/978-3-540-24691-6_4

Google Scholar

[3] F. Laguillaumie, D. Vergnaud. Designated verifier signatures: anonymity and efficient construction from any bilinear map, in: SCN2004, LNCS, vol. 3352, Springer-Verlag, 2004, p.105–119.

DOI: 10.1007/978-3-540-30598-9_8

Google Scholar

[4] F. Laguillaumie, D. Vergnaud. Multi-designated verifiers signatures, in: ICICS 2004, LNCS 3269, Springer-Verlag, 2004, p.495–507.

DOI: 10.1007/978-3-540-30191-2_38

Google Scholar

[5] W. Susilo, F. Zhang, Y. Mu. Identity-based strong designated verifier signature schemes, ACISP 2004, LNCS 3108, pp.313-324.

DOI: 10.1007/978-3-540-27800-9_27

Google Scholar

[6] P. K. Kancharla, S. Gummadidala, A. Saxena. Identity based strong designated verifier signature scheme, Informatica, 18 (2), 2007, pp.239-252.

DOI: 10.15388/informatica.2007.174

Google Scholar

[7] J. H. Zhang, J. Mao. A novel ID-based designated verifier signature scheme, Information Science, 178(3), 2008, pp.766-773.

DOI: 10.1016/j.ins.2007.07.005

Google Scholar

[8] X. Y. Huang, W. Susilo, Y. Mu, Fu-Tai Zhang. Short designated verifier signature scheme and its identity-based variant, International Journal of Network Security, 6(1), 2008, pp.82-93.

Google Scholar

[9] B. Y. Kang, C. Boyd, E. Dawson. Identity-based strong designated verifier signature schemes: Attacks and new construction. Computers and Electrical Engineering, 35 (1), 2009, pp.49-53.

DOI: 10.1016/j.compeleceng.2008.05.004

Google Scholar

[10] B. Y. Kang, C. Boyd, E. Dawson. A novel identity-based strong designated verifier signature scheme, The Journal of Systems and Software, 82 (2), 2009, pp.270-273.

DOI: 10.1016/j.jss.2008.06.014

Google Scholar

[11] H. Du, Q. Wen. Attack on Kang et al.'s identity-based strong designated verifier signature scheme. http://eprint.iacr.org/2008/297.pdf.

Google Scholar

[12] J. S. Lee, J. H. Chang, D. H. Lee. Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof. Computers and Electrical Engineering, 36 (2010) 948-954.

DOI: 10.1016/j.compeleceng.2010.02.001

Google Scholar