Designated-verifier proxy signature schemes

被引:0
|
作者
机构
[1] Wang, Guilin
来源
Wang, Guilin (glwang@iZr.a-star.edtsg) | 1600年 / Springer Science and Business Media, LLC期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In a proxy signature scheme, a user delegates hidher signing capability to another user in such a way that the latter can sign messages on behalf of the former. In this paper, we first propose a provably secure proxy signature scheme, which is based on a two-party Schnorr signature scheme. Then, we extend this basic scheme into designated-verifier proxy signatures (DVPS). More specifically, we get two versions of DVPS: weak DVPS and strong DVPS. In both versions, the validity of a proxy signature can be checked only by the designated verifier. In a weak DVPS scheme, however, the designated verifier can further convert such proxy signatures into public verifiable ones, while a strong DVPS scheme does not have the same property even if the designated verifier's secret key is revealed willingly or unwillingly. In addition, we briefly discuss some potential applications for DVPS. Copyright © 2005 by International Federation for Information Processing.
引用
收藏
相关论文
共 50 条
  • [31] Designated-Verifier Linkable Ring Signatures
    Behrouz, Pourandokht
    Grontas, Panagiotis
    Konstantakatos, Vangelis
    Pagourtzis, Aris
    Spyrakou, Marianna
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 51 - 70
  • [32] Designated-Verifier Pseudorandom Generators, and Their Applications
    Couteau, Geoffroy
    Hofheinz, Dennis
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 : 562 - 592
  • [33] On Delegatability of Some Strong Designated Verifier Signature Schemes
    Kang, Baoyuan
    Xu, Hao
    Niu, Yongzheng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [34] Short and provably secure designated verifier proxy signature scheme
    Hu, Xiaoming
    Tan, Wenan
    Xu, Huajie
    Wang, Jian
    IET INFORMATION SECURITY, 2016, 10 (02) : 69 - 79
  • [35] Verifier-key-flexible universal designated-verifier signatures
    Tso, Raylin
    Gonzalez Nieto, Juan Manuel
    Okamoto, Takeshi
    Boyd, Colin
    Okamoto, Eiji
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2007, 4887 : 403 - 421
  • [36] Designated verifier proxy signature scheme without random oracles
    Yu, Yong
    Xu, Chunxiang
    Zhang, Xiaosong
    Liao, Yongjian
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2009, 57 (08) : 1352 - 1364
  • [37] Designated verifier proxy signature scheme from bilinear pairings
    Lu, Rongxing
    Cao, Zhenfu
    Dong, Xiaolei
    Su, Renwang
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 40 - +
  • [38] New Constructions of Reusable Designated-Verifier NIZKs
    Lombardi, Alex
    Quach, Willy
    Rothblum, Ron D.
    Wichs, Daniel
    Wu, David J.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 670 - 700
  • [39] Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications
    Hu, Xiaoming
    Tan, Wenan
    Xu, Huajie
    Wang, Jian
    Ma, Chuang
    SECURITY AND COMMUNICATION NETWORKS, 2017, : 1 - 9
  • [40] Identity-based strong designated verifier signature schemes
    Susilo, W
    Zhang, FG
    Mu, Y
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 313 - 324