On the Construction of Efficient Private Signature Scheme

Article Preview

Abstract:

Private signature is a signature which provides signature privacy and restricted transference. Using the private scheme a user can sign a message in such a way that only a designated verifier can verify the signature. In some cases, the signer may want to preserve the privacy forever, which means that the initial verifier should not be able to convince anyone else of the fact that the signer signed the message. In some other cases, the signer may want to give the initial verifier the possibility to transfer his conviction to someone else, if desired. In this paper we first review the private signatures proposed by Javier Herranz, and point its drawback. Then we propose efficient private signature by combining a secure signature scheme and a non-interactive one-way key agreement.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1343-1346

Citation:

Online since:

April 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Diffie W and Hellman M, Multiuser cryptographic techniques. in: AFIPS 1976 National Computer Conference, pp.109-12. AFIPS Press (1976).

DOI: 10.1145/1499799.1499815

Google Scholar

[2] Chaum D and Antwerpen H V, Undeniable signatures, in: Proceedings Crypto'89, LNCS, vol. 435, Springer-Verlag, 1989, pp.212-16.

Google Scholar

[3] Chaum D, Designated confirmer signatures, in: Proceedings Eurocrypt'94, LNCS, vol. 950, Springer-Verlag, 1994, pp.86-9.

Google Scholar

[4] Jakobsson M, Sako K and Impagliazzo R, Designated verifier proofs and their applications, in: Proceedings Eurocrypt'96, LNCS, vol. 1070, Springer-Verlag, 1996, pp.142-54.

DOI: 10.1007/3-540-68339-9_13

Google Scholar

[5] Herranz J, On the transferability of private signatures, Information Sciences 179 (2009) 1647-56.

Google Scholar

[6] Bresson E, Stern J and Szydlo M, Threshold ring signatures for ad-hoc groups, in: Proceedings Crypto'02, LNCS, vol. 2442, Springer-Verlag, 2002, pp.465-80.

DOI: 10.1007/3-540-45708-9_30

Google Scholar

[7] Kang B, Boyd C, Dawson E, A novel ID-based strong designated verifier signature scheme, The journal of systems and software, 82 (2009) 270-273.

DOI: 10.1016/j.jss.2008.06.014

Google Scholar

[8] Kang B, Boyd C, Dawson E, Identity-based strong designated verifier signature schemes: attacks and new construction, Computers and electrical engineering, 35 (2009) 49-53.

DOI: 10.1016/j.compeleceng.2008.05.004

Google Scholar

[9] Zhang J, Mao J, A novel ID-based designated verifier signature scheme, Information sciences, 178 (2008) 766-733.

DOI: 10.1016/j.ins.2007.07.005

Google Scholar

[10] Susilo W, Zhang F, MuY, Identity-based strong designated verifier signature schemes, ACISP 2004, LNCS 3108, pp.313-324.

DOI: 10.1007/978-3-540-27800-9_27

Google Scholar