Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
How to construct secure proxy cryptosystem
Information Sciences: an International Journal
Enhancing the security of perfect blind DL-signatures
Information Sciences: an International Journal
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Weaknesses of undeniable signature schemes
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Designated verifier signature schemes: attacks, new security notions and a new construction
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Short (identity-based) strong designated verifier signature schemes
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Designated verifier signatures: anonymity and efficient construction from any bilinear map
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Identity-based strong designated verifier signature schemes: Attacks and new construction
Computers and Electrical Engineering
A novel identity-based strong designated verifier signature scheme
Journal of Systems and Software
On the transferability of private signatures
Information Sciences: an International Journal
Designated verifier proxy signature scheme without random oracles
Computers & Mathematics with Applications
Secure threshold multi authority attribute based encryption without a central authority
Information Sciences: an International Journal
Computers and Electrical Engineering
Identity-based strong designated verifier signature revisited
Journal of Systems and Software
Attribute-based strong designated-verifier signature scheme
Journal of Systems and Software
Pairing-based strong designated verifier proxy signature scheme with low cost
Security and Communication Networks
A short non-delegatable strong designated verifier signature
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Non-delegatable strong designated verifier signature on elliptic curves
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
A novel anonymous proxy signature scheme
Advances in Multimedia
Non-delegatable strong designated verifier signature using a trusted third party without pairings
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
Security and privacy for storage and computation in cloud computing
Information Sciences: an International Journal
A novel construction of SDVS with secure disavowability
Cluster Computing
Hi-index | 0.07 |
In a designated verifier signature scheme, only the designated verifier can verify the validity of a signature. This paper studies an Identity-based Strong Designated Verifier Signature (IBSDVS) scheme based on bilinear pairings by combining ID-based cryptosystem with the designated verifier signature scheme. We analyze the security of the scheme and the result shows that the security of our proposed scheme is closely related to the Bilinear Diffie-Hellman problem and the scheme is against delegatability attack.