Identity-Based Convertible Limited Verifier Signature Scheme in the Standard Model

Article Preview

Abstract:

A convertible limited verifier signature (CLVS) can be used to solve conflicts between authenticity and privacy in the digital signatures. In a CLVS scheme, the signature can be verified by a limited verifier. When necessary, the limited verifier can provide a proof to convince a judge that the signer has indeed generated the signature. However, the judge cannot transfer this proof to convince any other party. Also, the limited verifier signature should be converted into an ordinary one for public verification if required. In this paper, we proposed firstly identity-based converible limited verifier signature scheme in the standard model. We give the security proofs of our scheme and show that Our scheme achieved the desired security notions in the standard model (without random oracle).

You might also be interested in these eBooks

Info:

Periodical:

Pages:

599-602

Citation:

Online since:

February 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chaum D and Antwerpen H. van, in: Undeniable Signatures, Advances in Cryptology-CRYPTO'89, Berlin: Springer-Verlag, LNCS 0435, 1990: 212-216.

DOI: 10.1007/0-387-34805-0_20

Google Scholar

[2] Jakobsson M, Sako K and Impagliazzo R, in: Designated Verifier Proofs and Their Applications, Advances in Cryptology-EUROCRYPT'96, Berlin: Springer-Verlag, LNCS 1070, 1996: 143-154.

DOI: 10.1007/3-540-68339-9_13

Google Scholar

[3] Araki S, Uehara S, Imamura K, in: The Limited Verifier Signature and Its Application, IEICE Transactions on Fundamentals, 1999, E82-A(1): 63-68.

Google Scholar

[4] Zhang F and Kim K, in: A Universal Forgery on Araki et al. 's Convertible Limited Verifier Signature Scheme, in IEICE Transaction on Fundamentals, 2003, E86-A(2): 515-516.

Google Scholar

[5] Chen X, Zhang F and Kim K, in: Limited Verifier Signature from Bilinear Pairings, ACNS'04, Berlin: Springer-Verlag, LNCS 3089, 2004: 13-148.

Google Scholar

[6] Zhang J, Li H and Wang J, in: A Convertible Limited Verifier Signature Scheme, WAIM'05, Berlin: Springer-Verlag, LNCS 3739, 2005: 638-644.

Google Scholar

[7] Wu C. and Huang Z, in: Certificateless Convertible Limited Verifier Signature Scheme, TENCON'06, IEEE, Hong Kong, China, 2006: 1-4.

DOI: 10.1109/tencon.2006.344126

Google Scholar

[8] Wang X, Cao L, Wang S and Zhang Y, in: ID-Based Convertible Limited (multi) Verifier Signature Scheme, ICCSSE'08, IEEE CS, Wuhan, Hubei, 2008: 774-777.

DOI: 10.1109/csse.2008.1566

Google Scholar

[9] Tso R, Yi X, Okamoto T and Okamoto E, in: Efficient Convertible Limited Verifier Signatures, ISIT'08, IEEE, Toronto, 2008: 230-234.

DOI: 10.1109/isit.2008.4594982

Google Scholar

[10] Shamir A, in: Identity-Based Cryptosystems and Signature Schemes, Advances in Cryptology- CRYPTO'84, Berlin: Springer-Verlag, LNCS 0196, 1985: 47-53.

DOI: 10.1007/3-540-39568-7_5

Google Scholar

[11] Waters B, in: Efficient Identity-Based Encryption Without Random Oracles, . Advances in Cryptology-EUROCRYPT'05, Berlin: Springer-Verlag, LNCS 3494, 200: 114-127.

DOI: 10.1007/11426639_7

Google Scholar