Designated-verifier proxy signature schemes

被引:0
|
作者
机构
[1] Wang, Guilin
来源
Wang, Guilin (glwang@iZr.a-star.edtsg) | 1600年 / Springer Science and Business Media, LLC期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In a proxy signature scheme, a user delegates hidher signing capability to another user in such a way that the latter can sign messages on behalf of the former. In this paper, we first propose a provably secure proxy signature scheme, which is based on a two-party Schnorr signature scheme. Then, we extend this basic scheme into designated-verifier proxy signatures (DVPS). More specifically, we get two versions of DVPS: weak DVPS and strong DVPS. In both versions, the validity of a proxy signature can be checked only by the designated verifier. In a weak DVPS scheme, however, the designated verifier can further convert such proxy signatures into public verifiable ones, while a strong DVPS scheme does not have the same property even if the designated verifier's secret key is revealed willingly or unwillingly. In addition, we briefly discuss some potential applications for DVPS. Copyright © 2005 by International Federation for Information Processing.
引用
收藏
相关论文
共 50 条
  • [21] Universal designated multi verifier signature schemes
    Ng, CY
    Susilo, W
    Mu, Y
    11th International Conference on Parallel and Distributed Systems Workshops, Vol II, Proceedings,, 2005, : 305 - 309
  • [23] Certificateless universal designated verifier signature schemes
    State Key Laboratory, Integrated Service Network, Xidian University, Xi'an, 710071, China
    J. China Univ. Post Telecom., 3 (85-90,94):
  • [24] Designated-verifier proxy signatures for e-commerce from bilinear pairings
    Li, XX
    Chen, KF
    Li, SQ
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1249 - 1252
  • [25] A New Designated Verifier Proxy Signature in Standard Model
    Guo, Li-Hong
    Wu, Hai-Tao
    Yang, Qing
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 148 - 151
  • [26] Designated verifier proxy signature scheme with message recovery
    Lu, RX
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1237 - 1246
  • [27] Short designated verifier proxy signature from pairings
    Huang, XY
    Mu, Y
    Susilo, W
    Zhang, FT
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 835 - 844
  • [28] Attacks on One Designated Verifier Proxy Signature Scheme
    Kang, Baoyuan
    JOURNAL OF APPLIED MATHEMATICS, 2012,
  • [29] A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme
    Li, Fengying
    Xue, Qingshui
    Zhang, Jiping
    Cao, Zhenfu
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2009, 10 : 416 - +
  • [30] RETRACTED: Identity-Based Designated-Verifier Proxy Signature Scheme with Information Recovery in Telemedicine System (Retracted Article)
    Zhou, Yuping
    Hu, Yu
    Chen, Jianneng
    Huang, Zengjie
    Huang, Hui
    Zhang, Yi Fan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022