期刊文献+

An Identity-Based Strong Designated Verifier Proxy Signature Scheme 被引量:3

An Identity-Based Strong Designated Verifier Proxy Signature Scheme
下载PDF
导出
摘要 In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements. In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1633-1635,共3页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of Chinafor Distinguished Young Scholars(60225007) the Na-tional Research Fundfor the Doctoral Programof Higher Education ofChina(20020248024) the Science and Technology Research Pro-ject of Shanghai (04DZ07067)
关键词 strong designated verifier signature proxy signature identity-based cryptosystem bilinear pairing strong designated verifier signature proxy signature identity-based cryptosystem bilinear pairing
  • 相关文献

参考文献6

  • 1Saeednia S,Kremer S,Markowitch O.An efficient strong designated verifier signature scheme[].The th Intl Conf on Inf Security and Cryptology (ICISC ).2003
  • 2Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[].Proceedings of the rd ACM Conference on Computer and Communications Security-CCS’.1996
  • 3Mambo M,Usuda K,Okamoto E.Proxy signatures: delegation of the power to sign messages[].IEICE Transactions on Fundamentals of Electronic Communication and Computer Science.1996
  • 4Lee B,Kim H,Kim K.Strong proxy signature and its applications[].Proceedings of the Symposium on Cryptography and Information Security(SCIS ).2001
  • 5Dai J Z,Yang X H,Dong J X.Designated-Receiver Proxy Signature Scheme for Electronic Commerce [ C][].Proc of IEEE International Conference on Systems Man and Cy- bernetics.2003
  • 6Susilo W,Zhang F G,Mu Y.Identity-Based Strong Desig- nated Verifier Signature Schemes[].ACISP.2004

同被引文献22

  • 1DAI JZ, YANG XH, DONG JX. Designated-receiver proxy signature scheme for electronic commerce[C]//Proceedings of IEEE International Conference on Systems, Man and Cybernetics, New York: IEEE Press, 2003, 384-389.
  • 2WANG GL. Designated-verifier proxy signatures for e-commerce [EB/OL]. [2008-12-1]. http://icsd. izr. a-star, edu. sg/staff/guilin/papers/ICME04-fl, pdf.
  • 3WANG GL. Designated-verifier proxy signature schemes[C]//Security and privacy in the age of ubiq- uitous computing, Proceedings of 20th International Conference on Information Security (IFIP/SEC 2005), Berlin: Springer-Verlag, 2005, 409-423.
  • 4YI L J, BAI GQ, XIAO GZ. Proxy multi-signature scheme: a new type of proxy signature scheme[J]. Electronics Letter, 2000, 36(6): 527-528.
  • 5KOZLOV A, REYZIN L. Forward-secure digital signature scheme with fast key update[C]//Proceedings of Security in Communication Networks, LNCS2576, Berlin: Springer-Verlag, 2002, 247-262.
  • 6MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Trans Fundam, 1996, E79-A(9): 1338-1354.
  • 7MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delegating signing operation[C]//Pro- ceedings of 3rd ACM Conference on Computer and Communications Security, New York: ACM Press, 1996, 48-57.
  • 8JAKOBSSON M, SAKO K, IMPAGLIAZZO R. Designated-verifier proofs and their applications[C] //Proceedings of Eurocrypt '96, LNCS1070, Berlin: Springer-Verlag, 1996, 143-154.
  • 9ANDERSON R. Invited Lecture[C]. Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich: ACM Press, 1997, 1-7.
  • 10Shamir A. Identity-based cryptosystems and signature schemes [ C ]// Advances in Cryptology : CRYPTO1984, LNCS196. Berlin : Springer, 1984:47 -53.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部