Designated-verifier proxy signature schemes

被引:0
|
作者
机构
[1] Wang, Guilin
来源
Wang, Guilin (glwang@iZr.a-star.edtsg) | 1600年 / Springer Science and Business Media, LLC期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In a proxy signature scheme, a user delegates hidher signing capability to another user in such a way that the latter can sign messages on behalf of the former. In this paper, we first propose a provably secure proxy signature scheme, which is based on a two-party Schnorr signature scheme. Then, we extend this basic scheme into designated-verifier proxy signatures (DVPS). More specifically, we get two versions of DVPS: weak DVPS and strong DVPS. In both versions, the validity of a proxy signature can be checked only by the designated verifier. In a weak DVPS scheme, however, the designated verifier can further convert such proxy signatures into public verifiable ones, while a strong DVPS scheme does not have the same property even if the designated verifier's secret key is revealed willingly or unwillingly. In addition, we briefly discuss some potential applications for DVPS. Copyright © 2005 by International Federation for Information Processing.
引用
收藏
相关论文
共 50 条
  • [1] Designated-verifier proxy signature schemes
    Wang, GL
    Security and Privacy in the Age of Ubiquitous Computing, 2005, 181 : 409 - 423
  • [2] Designated-verifier chameleon proxy signature
    Zhang, Jianhong
    Ji, Cheng
    Geng, Qin
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 554 - 561
  • [3] Designated-Verifier Chameleon Proxy Signature
    Zhang, Jianhong
    Ji, Cheng
    Geng, Qin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 29 - 29
  • [4] A Strong Designated-verifier Proxy Signature scheme
    Zhang, Bo
    Xu, Qiuliang
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 569 - 572
  • [5] An improved designated-verifier proxy signature scheme
    Zhang, Jianhong
    INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 77 - 82
  • [6] New Certificateless Designated-verifier Proxy Signature Scheme
    Liu Yun-fang
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 585 - 588
  • [7] Cryptanalysis and Improvement of a Strong Designated-verifier Proxy Signature scheme
    Yang, Liguo
    Ou, Funa
    Zhao, Jing
    ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 1999 - 2003
  • [8] Universal designated-verifier signature with aggregation
    Mihara, A
    Tanaka, K
    Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 514 - 519
  • [9] On the Security of a Designated-Verifier Proxy Signature Scheme and Its Improved Scheme (revisited)
    Zhang, Jianhong
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2196 - 2199
  • [10] An ID-Based Designated-Verifier Proxy Multi-Signature Scheme
    Zuo, Weiping
    Liu, Yunfang
    Wang, Sanfu
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 576 - 579