首页 | 本学科首页   官方微博 | 高级检索  
     


Identity-based strong designated verifier signature schemes: Attacks and new construction
Authors:Baoyuan Kang  Colin Boyd
Affiliation:a School of Mathematical Sciences and Computing Technology, Central South University, Chang’sha, Hunan 410075, PR China
b Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, QLD 4001, Australia
Abstract:A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.
Keywords:Identity base cryptography  Designated verifier signature  Identity-based signature  Proxy signature  Bilinear parirings
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号