CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
A novel ID-based designated verifier signature scheme
Information Sciences: an International Journal
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Computers and Electrical Engineering
Discrete logarithm based chameleon hashing and signatures without key exposure
Computers and Electrical Engineering
Dual-verifiers DVS with message recovery for tolerant routing in wireless sensor networks
PAISI'11 Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics
Attribute-based strong designated-verifier signature scheme
Journal of Systems and Software
A novel anonymous proxy signature scheme
Advances in Multimedia
On provably secure code-based multiple grade proxy signature scheme
International Journal of High Performance Systems Architecture
Hi-index | 0.00 |
A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.