Designated-verifier proxy signature schemes

被引:0
|
作者
机构
[1] Wang, Guilin
来源
Wang, Guilin (glwang@iZr.a-star.edtsg) | 1600年 / Springer Science and Business Media, LLC期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In a proxy signature scheme, a user delegates hidher signing capability to another user in such a way that the latter can sign messages on behalf of the former. In this paper, we first propose a provably secure proxy signature scheme, which is based on a two-party Schnorr signature scheme. Then, we extend this basic scheme into designated-verifier proxy signatures (DVPS). More specifically, we get two versions of DVPS: weak DVPS and strong DVPS. In both versions, the validity of a proxy signature can be checked only by the designated verifier. In a weak DVPS scheme, however, the designated verifier can further convert such proxy signatures into public verifiable ones, while a strong DVPS scheme does not have the same property even if the designated verifier's secret key is revealed willingly or unwillingly. In addition, we briefly discuss some potential applications for DVPS. Copyright © 2005 by International Federation for Information Processing.
引用
收藏
相关论文
共 50 条
  • [41] An Improved Designated Verifier Signature Schemes Using Bilinear Paring
    Yue, Q. Z.
    Shen, H.
    Chen, J. H.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 395 - 398
  • [42] ID-based designated multi verifier proxy signature scheme
    Tang, Zhao-Xia
    Xu, Qiu-Liang
    Zhu, Jian-Dong
    Tongxin Xuebao/Journal on Communication, 2008, 29 (SUPPL.): : 41 - 45
  • [43] An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce
    Lin, Han-Yu
    Wu, Tzong-Sun
    Huang, Shih-Kun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (04) : 771 - 785
  • [44] PROXY BLIND SIGNATURE SCHEME FOR ID-BASED DESIGNATED VERIFIER
    Zhang, Xiaozhi
    Xi, Junfu
    Wang, Zhengqiang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 376 - 379
  • [46] Efficient Strong Designated Verifier Proxy Signature Scheme with Low Cost
    Liu, Yan
    Hu, Xiaoming
    Zhang, Xiaojun
    Wang, Jian
    Yang, Yinchun
    2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 568 - 572
  • [47] Multi-theorem Designated-Verifier NIZK for QMA
    Shmueli, Omri
    ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I, 2021, 12825 : 375 - 405
  • [48] Short (identity-based) strong designated verifier signature schemes
    Huang, Xinyi
    Susilo, Willy
    Mu, Yi
    Zhang, Futai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 214 - 225
  • [49] Highly efficient strong designated verifier signature schemes in the standard model
    Hu, Xiaoming
    Huo, Xin
    Yang, Yinchun
    Wang, Jian
    2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 316 - 320
  • [50] Efficient identity-based strong designated verifier signature schemes
    Duan, Meijiao
    Xu, Jing
    Feng, Dengguo
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 902 - 911