期刊文献+

An Identity-Based Strong Designated Verifier Proxy Signature Scheme 被引量:3

An Identity-Based Strong Designated Verifier Proxy Signature Scheme
下载PDF
导出
摘要 In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements. In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1633-1635,共3页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of Chinafor Distinguished Young Scholars(60225007) the Na-tional Research Fundfor the Doctoral Programof Higher Education ofChina(20020248024) the Science and Technology Research Pro-ject of Shanghai (04DZ07067)
关键词 strong designated verifier signature proxy signature identity-based cryptosystem bilinear pairing strong designated verifier signature proxy signature identity-based cryptosystem bilinear pairing
  • 相关文献

参考文献6

  • 1Saeednia S,Kremer S,Markowitch O.An efficient strong designated verifier signature scheme[].The th Intl Conf on Inf Security and Cryptology (ICISC ).2003 被引量:1
  • 2Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[].Proceedings of the rd ACM Conference on Computer and Communications Security-CCS’.1996 被引量:1
  • 3Mambo M,Usuda K,Okamoto E.Proxy signatures: delegation of the power to sign messages[].IEICE Transactions on Fundamentals of Electronic Communication and Computer Science.1996 被引量:1
  • 4Lee B,Kim H,Kim K.Strong proxy signature and its applications[].Proceedings of the Symposium on Cryptography and Information Security(SCIS ).2001 被引量:1
  • 5Dai J Z,Yang X H,Dong J X.Designated-Receiver Proxy Signature Scheme for Electronic Commerce [ C][].Proc of IEEE International Conference on Systems Man and Cy- bernetics.2003 被引量:1
  • 6Susilo W,Zhang F G,Mu Y.Identity-Based Strong Desig- nated Verifier Signature Schemes[].ACISP.2004 被引量:1

同被引文献22

  • 1DAI JZ, YANG XH, DONG JX. Designated-receiver proxy signature scheme for electronic commerce[C]//Proceedings of IEEE International Conference on Systems, Man and Cybernetics, New York: IEEE Press, 2003, 384-389. 被引量:1
  • 2WANG GL. Designated-verifier proxy signatures for e-commerce [EB/OL]. [2008-12-1]. http://icsd. izr. a-star, edu. sg/staff/guilin/papers/ICME04-fl, pdf. 被引量:1
  • 3WANG GL. Designated-verifier proxy signature schemes[C]//Security and privacy in the age of ubiq- uitous computing, Proceedings of 20th International Conference on Information Security (IFIP/SEC 2005), Berlin: Springer-Verlag, 2005, 409-423. 被引量:1
  • 4YI L J, BAI GQ, XIAO GZ. Proxy multi-signature scheme: a new type of proxy signature scheme[J]. Electronics Letter, 2000, 36(6): 527-528. 被引量:1
  • 5KOZLOV A, REYZIN L. Forward-secure digital signature scheme with fast key update[C]//Proceedings of Security in Communication Networks, LNCS2576, Berlin: Springer-Verlag, 2002, 247-262. 被引量:1
  • 6MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Trans Fundam, 1996, E79-A(9): 1338-1354. 被引量:1
  • 7MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delegating signing operation[C]//Pro- ceedings of 3rd ACM Conference on Computer and Communications Security, New York: ACM Press, 1996, 48-57. 被引量:1
  • 8JAKOBSSON M, SAKO K, IMPAGLIAZZO R. Designated-verifier proofs and their applications[C] //Proceedings of Eurocrypt '96, LNCS1070, Berlin: Springer-Verlag, 1996, 143-154. 被引量:1
  • 9ANDERSON R. Invited Lecture[C]. Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich: ACM Press, 1997, 1-7. 被引量:1
  • 10Shamir A. Identity-based cryptosystems and signature schemes [ C ]// Advances in Cryptology : CRYPTO1984, LNCS196. Berlin : Springer, 1984:47 -53. 被引量:1

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部