Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
The random oracle methodology, revisited (preliminary version)
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Secure universal designated verifier signature without random oracles
International Journal of Information Security
Universal designated verifier signature without delegatability
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Designated verifier signature schemes: attacks, new security notions and a new construction
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Identity-Based universal designated verifier signatures
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Forward-secure identity-based signature: Security notions and construction
Information Sciences: an International Journal
Identity-based strong designated verifier signature revisited
Journal of Systems and Software
A short non-delegatable strong designated verifier signature
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Universal designated verifier signcryption
NSS'12 Proceedings of the 6th international conference on Network and System Security
Non-delegatable strong designated verifier signature using a trusted third party without pairings
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
A novel construction of SDVS with secure disavowability
Cluster Computing
Hi-index | 0.00 |
Universal designated verifier signature was first introduced by Steinfeld, Bull, Wang and Pieprzyk in Asiacrypt 2003. In the universal designated verifier signature scheme, any holder of a signature can designate the signature to any desired designated verifier, such that only the designated verifier will believe that the signature holder holds a valid signature. In SecUbiq'05 [Zhang Fangguo, Susilo Willy, Mu Yi, Chen Xiaofeng, 2005. Identity-based universal designated verifier signatures. In: The First International Workshop on Security in Ubiquitous Computing Systems, Nagasaki, Japan, LNCS 3823. Springer-Verlag, Berlin, pp. 825-834] first extended this notion to the identity based setting and proposed two identity based universal designated verifier signature schemes. However, the security of their scheme is based on the random oracle model. Up to now, there is no provably secure identity based universal designated verifier signature scheme in the standard model. In this paper, we propose the first identity based universal designated verifier signature scheme whose security can be proven in the standard model based on the hardness of the computational Diffie-Hellman (CDH) problem.