期刊文献+

强指定验证者签名的不可授权性 被引量:2

On non-delegatability property of strong designated verifier signature
下载PDF
导出
摘要 针对指定验证者签名权的授权攻击以及强指定验证者签名的弱不可授权性,提出了强指定验证者签名的签名者身份的强保密性,即要求强指定验证者签名方案在授权的情况下签名者的身份是保密的.证明了存在满足该性质的强指定验证者签名方案.最后证明了该概念与共同密钥和强指定验证者签名是一致的,且不同于弱不可授权性,该概念同时适用于强指定验证者签名与指定验证者签名,即弱不可授权性是冗余的. Aimed to the attack on delegatability for designated verifier signature (DVS) and the property of weak non-delegatability for strong designated verifier signature (SDVS), a notion of strong privacy of signer's identity for SDVS was proposed, which is the privacy of signer's identity under the delegatability notion. Then it was shown that there exists the scheme which satisfies this property. Finally this notion was verified to be consistent with the notion of common key delegation and the concept of SDVS. Unlike the previous definition of weak non-delegatability, this notion is applicable to both DVS and SDVS schemes, which means that weak non-delegatability is redundant.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2009年第2期334-337,343,共5页 Journal of Zhejiang University:Engineering Science
关键词 强指定验证者签名 不可授权性 签名者身份的强保密性 strong designated verifier signature non-delegatability strong privacy of signer's identity
  • 相关文献

参考文献13

  • 1JAKOBSSON M, SAKO K, IMPAGLIAZZO R. Designated verifier proofs and their applications [C]// Proceedings of Eurocrypt' 96. Zaragoza: Springer-Verlag, 1996: 143-154.
  • 2SAEEDNIA S, KREMER S, MARKOWITCH O. An efficient strong designated verifier signature scheme [C]// The 4th International Conference on Information Security and Cryptology (ICISC' 03). Seoul: Springer-Vetlag, 2003: 40-54.
  • 3LAGUILLAUMIE F,VERGNAUD D. Designated verifier signatures: anonymity and efficient construction from any bilinear map [C]// The Fourth Conference on Security in Communication Networks (SCN'04). Amalfi: Springer-Verlag, 2004 : 105 - 119.
  • 4HUANG X, SUSILO W, MU Y, et al. Short (identitybased) strong designated verifier signature schemes [C]//The 2nd Information Security Practice and Experience Conference ( ISPEC ' 06 ). Hangzhou:Springer- Verlag, 2006:214 - 225.
  • 5SUSILO W, ZHANG F, MU Y. Identity-based strong designated verifier signature schemes[C]// The 9th Australasian Conference on Information Security and Privacy (ACISP' 04). Sydney: Springer-Verlag, 2004: 313- 324.
  • 6LIPMAA H, WANG G, BAO F. Designated verifier signature schemes: attacks, new security notions and a new construction [C]// The 32nd International Colloquium on Automata, Languages and Programming (ICALP' 05). Lisboa: Springer-Verlag, 2005:459-471.
  • 7STEINFELD R, BULL L, WANG H, et al. Universal designated-verifier signatures [C]// Proceedings of ASIACRYPT'03. Taipei: Springer-Verlag, 2003:523 - 543.
  • 8STEINFELD R, WANG H, PIEPRZYK J. Efficient extension of standard Schnorr/RSA signatures into universal designated verifier signatures [C]// Proceedings of Conference on Public Key Cryptography (PKC'04). Singapore: Springer-Verlag, 2004: 86- 100.
  • 9LI Y, LIPMAA H, PEI D. On delegatability of four designated verifier signatures [C]// The 2005 International Conference on Information and Communications Security (ICICS' 05). Beijing: Springer-Verlag, 2005: 61- 71.
  • 10ZHANG R, FURUKAWA J, IMAI H. Short signature and universal designated verifier signature without random oracles [C]// Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS' 05). New York: Springer-Verlag, 2005: 483- 498.

同被引文献20

  • 1戴佳筑,杨小虎,董金祥.一种消息保密的代理签名方案[J].浙江大学学报(工学版),2005,39(5):701-704. 被引量:7
  • 2张鹏,叶澄清,马雪英,李欣.一种改进的门限代理签密协议[J].浙江大学学报(工学版),2006,40(3):392-394. 被引量:3
  • 3刘景美,王新梅.Schnorr签名方案的一种攻击[J].计算机科学,2006,33(7):141-142. 被引量:4
  • 4ZHANG Huanguo WANG Yuhua WANG Bangju WU XIAOping.Evolutionary Random Sequence Generators Based on LFSR[J].Wuhan University Journal of Natural Sciences,2007,12(1):75-78. 被引量:3
  • 5JAKOBSSON M, SAKO K, IMPAGLIAZZO R. Designated verifier proofs and their applications[C]//Advances in Cryptology-EuroCrypt. Berlin: Springer Heidelberg, 1996: 143-154.
  • 6SAEEDNIA S, KREMER S, MARKOWITCH O. An efficient strong designated verifier signature scheme[C]//The international conference on information security and cryptology. Seoul: Swinger Berlin\Heidelberg, 2003: 40-54.
  • 7LAGUILLAUMIE F, VERGNAUD D. Designated verifier signatures: anonymity and efficient construction from any bilinear map[C]//The Sixth Conference on Security and Cryptography for Networks. Amalfi: Springer, Berlin/Heidelberg 2004:105-119.
  • 8HUANG X, SUSILO W, MU Y, et al. Short(identity-based) strong designated verifier signature schemes[C]//The Information Security Practice and Experience Conference. Hangzhou: Springer Berlin/Heidelberg, 2006:214-225.
  • 9SUSILO W, ZHANG F, MU Y. Identity-based strong designated verifier signature schemes[C]//The Conference on Information Security and Privacy. Sydney: Springer Berlin / Heidelberg 2004, 313-324.
  • 10KANG B, BOYD C, DAWSON E. Identity-based strong designated verifier signature schemes: attacks and new construction[J]. Computers and Electrical Engineering, 2009, 35: 49-53.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部