Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Short Signatures from the Weil Pairing
Journal of Cryptology
Towards provable security for ad hoc routing protocols
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Efficient Authentication for Reactive Routing Protocols
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Designated verifier signature schemes: attacks, new security notions and a new construction
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Short (identity-based) strong designated verifier signature schemes
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Designated verifier signatures: anonymity and efficient construction from any bilinear map
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
On the transferability of private signatures
Information Sciences: an International Journal
Identity Based Aggregate Signcryption Schemes
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Aggregate message authentication codes
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
IEEE 802.11 user fingerprinting and its applications for intrusion detection
Computers & Mathematics with Applications
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Security and Communication Networks
MAC aggregation with message multiplicity
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Secure and robust multipath routings for advanced metering infrastructure
The Journal of Supercomputing
Hi-index | 0.00 |
A designated verifier signature convinces only the specific recipient of the message of its integrity and origin. Following the notion of aggregate signature introduced by Boneh et al. we introduce in this work the notion of aggregate designated verifier signature. After defining the protocols and the security model for such schemes, we give a general construction which is based on message authentication codes and that can be extended to an identity-based scenario. The resulting schemes are proved to be secure under the Computational Diffie Hellman (CDH) assumption, in the random oracle model. They are much more efficient than standard aggregate signature schemes, at the price of losing some properties of standard signatures, in particular non-repudiation. Finally we explain the possible application of aggregate designated verifier signatures to the authentication of messages in routing protocols. We compare our new scheme with existing standard aggregate signature schemes and show why our solution with aggregate designated verifier signatures is more suitable for securing routing in mobile ad hoc networks.