Identity-based strong designated verifier signature schemes: Attacks and new construction |
| |
Authors: | Baoyuan Kang Colin Boyd |
| |
Affiliation: | a School of Mathematical Sciences and Computing Technology, Central South University, Chang’sha, Hunan 410075, PR China b Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, QLD 4001, Australia |
| |
Abstract: | A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme. |
| |
Keywords: | Identity base cryptography Designated verifier signature Identity-based signature Proxy signature Bilinear parirings |
本文献已被 ScienceDirect 等数据库收录! |
|