Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Designated Verifier Proxy Signature Scheme from Bilinear Pairings
IMSCCS '06 Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences - Volume 2 (IMSCCS'06) - Volume 02
A novel ID-based designated verifier signature scheme
Information Sciences: an International Journal
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
An analysis of proxy signatures: is a secure channel necessary?
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
A short proxy signature scheme: efficient authentication in the ubiquitous world
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Short designated verifier proxy signature from pairings
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Short (identity-based) strong designated verifier signature schemes
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Improvement of a proxy multi-signature scheme without random oracles
Computer Communications
Short designated verifier proxy signatures
Computers and Electrical Engineering
Strongly unforgeable proxy signature scheme secure in the standard model
Journal of Systems and Software
A novel anonymous proxy signature scheme
Advances in Multimedia
A novel construction of SDVS with secure disavowability
Cluster Computing
Hi-index | 0.09 |
In a designated verifier proxy signature scheme, one can delegate his or her signing capability to another user in such a way that the latter can sign messages on behalf of the former, but the validity of the resulting signatures can only be verified by the designated verifier. Several designated verifier proxy signature schemes have been proposed so far. However, most of the schemes were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. In this paper, we propose a new construction of designated verifier proxy signature whose security can be proven without using the random oracle model. Our scheme is inspired by Waters' Identity-based encryption. The unforgeability of our scheme is based on the hardness of Gap Bilinear Diffie-Hellman problem. As far as we know, this is the first designated verifier proxy signature secure in the standard model.