A Novel ID-Based Strong Designated Verifier Signature Scheme

Abstract:

Article Preview

We construct an efficient and novel identity-based strong designated verifier signature (IBSDVS) scheme based on bilinear pairings, and provide the security proofs and efficiency analysis for the proposed scheme. Our IBSDVS scheme achieves higher efficiency and satisfies all the security requirements of the designated verifier signatures in identity-based cryptography.

Info:

Periodical:

Edited by:

Zhengyi Jiang, Yugui Li, Xiaoping Zhang, Jianmei Wang and Wenquan Sun

Pages:

2870-2874

Citation:

H. Z. Du and M. J. Huang, "A Novel ID-Based Strong Designated Verifier Signature Scheme", Applied Mechanics and Materials, Vols. 220-223, pp. 2870-2874, 2012

Online since:

November 2012

Export:

Price:

$38.00

[1] M. Jakobsson, K. Sako, K. R. Impaliazzo. Designated verifier proofs and their applications. In Eurocrypt 1996, LNCS 1070, Springer-Verlag, 1996, pp.143-154.

DOI: https://doi.org/10.1007/3-540-68339-9_13

[2] S. Saeednia, S. Kremer, O. Markovitch. An efficient strong designated verifier signature scheme. CICS 2003, LNCS 2971, Springer-Verlag, 2003, pp.40-54.

DOI: https://doi.org/10.1007/978-3-540-24691-6_4

[3] F. Laguillaumie, D. Vergnaud. Designated verifier signatures: anonymity and efficient construction from any bilinear map, in: SCN2004, LNCS, vol. 3352, Springer-Verlag, 2004, p.105–119.

DOI: https://doi.org/10.1007/978-3-540-30598-9_8

[4] F. Laguillaumie, D. Vergnaud. Multi-designated verifiers signatures, in: ICICS 2004, LNCS 3269, Springer-Verlag, 2004, p.495–507.

DOI: https://doi.org/10.1007/978-3-540-30191-2_38

[5] W. Susilo, F. Zhang, Y. Mu. Identity-based strong designated verifier signature schemes, ACISP 2004, LNCS 3108, pp.313-324.

DOI: https://doi.org/10.1007/978-3-540-27800-9_27

[6] P. K. Kancharla, S. Gummadidala, A. Saxena. Identity based strong designated verifier signature scheme, Informatica, 18 (2), 2007, pp.239-252.

[7] J. H. Zhang, J. Mao. A novel ID-based designated verifier signature scheme, Information Science, 178(3), 2008, pp.766-773.

DOI: https://doi.org/10.1016/j.ins.2007.07.005

[8] X. Y. Huang, W. Susilo, Y. Mu, Fu-Tai Zhang. Short designated verifier signature scheme and its identity-based variant, International Journal of Network Security, 6(1), 2008, pp.82-93.

[9] B. Y. Kang, C. Boyd, E. Dawson. Identity-based strong designated verifier signature schemes: Attacks and new construction. Computers and Electrical Engineering, 35 (1), 2009, pp.49-53.

DOI: https://doi.org/10.1016/j.compeleceng.2008.05.004

[10] B. Y. Kang, C. Boyd, E. Dawson. A novel identity-based strong designated verifier signature scheme, The Journal of Systems and Software, 82 (2), 2009, pp.270-273.

DOI: https://doi.org/10.1016/j.jss.2008.06.014

[11] H. Du, Q. Wen. Attack on Kang et al. 's identity-based strong designated verifier signature scheme. http: /eprint. iacr. org/2008/297. pdf.

[12] J. S. Lee, J. H. Chang, D. H. Lee. Forgery attacks on Kang et al. 's identity-based strong designated verifier signature scheme and its improvement with security proof. Computers and Electrical Engineering, 36 (2010) 948-954.

DOI: https://doi.org/10.1016/j.compeleceng.2010.02.001