A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Universal Designated Multi Verifier Signature Schemes
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
Journal of Cryptology
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
New extensions of pairing-based signatures into universal designated verifier signatures
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Designated verifier signature schemes: attacks, new security notions and a new construction
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Identity-Based universal designated verifier signatures
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Short designated verifier proxy signature from pairings
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
The security of the FDH variant of chaum's undeniable signature scheme
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Short signature and universal designated verifier signature without random oracles
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Designated verifier signatures: anonymity and efficient construction from any bilinear map
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
On delegatability of four designated verifier signatures
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
An identity based universal designated verifier signature scheme secure in the standard model
Journal of Systems and Software
How to Balance Privacy with Authenticity
Information Security and Cryptology --- ICISC 2008
Universal Designated Verifier Signatures with Threshold-Signers
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Verifier-key-flexible universal designated-verifier signatures
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Identity-based strong designated verifier signature revisited
Journal of Systems and Software
How to construct state registries-matching undeniability with public security
ACIIDS'10 Proceedings of the Second international conference on Intelligent information and database systems: Part I
Rigorous security requirements for designated verifier signatures
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
A short non-delegatable strong designated verifier signature
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Non-delegatable strong designated verifier signature on elliptic curves
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
A novel construction of SDVS with secure disavowability
Cluster Computing
Hi-index | 0.00 |
In Asiacrypt 2003, the notion of the universal designated verifier signature (UDVS) was put forth by Steinfeld, Bull, Wang and Pieprzyk. In the new paradigm, any signature holder (not necessarily the signer) can designate the standard signature to any desired designated verifier (using the verifier's public key), such that only the designated verifier will believe that the signature holder holds a valid standard signature, and hence, believe that the signer has indeed signed the message. When the signature holder is the signer himself, the UDVS scheme can be considered as a designated verifier signature (DVS) which was proposed by Jakobsson, Sako and Impagliazzo in Eurocrypt 1996. In the recent paper published in ICALP 2005, Lipmaa, Wang and Bao introduced a new security property, called “non-delegatability”, as an essential property of (universal) designated verifier signature. Subsequently, Li, Lipmaa and Pei used this new property to “attack” four designated verifier signatures in ICICS 2005 and showed that none of them satisfy the required property. To date, there is no UDVS scheme that does not suffer from the delegatability problem. In this paper, we propose the first provably secure UDVS without delegatability, which can also be regarded as another DVS scheme without delegatability. We also refine the models of the UDVS schemes and introduce the notion of the strong universal designated verifier signature (SUDVS). We believe that the model itself is of an independent interest.