Identity-based strong designated verifier signature schemes: Attacks and new construction

  • Authors:
  • Baoyuan Kang;Colin Boyd;Ed Dawson

  • Affiliations:
  • School of Mathematical Sciences and Computing Technology, Central South University, Chang'sha, Hunan 410075, PR China and Information Security Institute, Queensland University of Technology, GPO B ...;Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, QLD 4001, Australia;Information Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, QLD 4001, Australia

  • Venue:
  • Computers and Electrical Engineering
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.