Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A new ring signature scheme with signer-admission property
Information Sciences: an International Journal
Identity-based universal designated multi-verifiers signature schemes
Computer Standards & Interfaces
An identity based universal designated verifier signature scheme secure in the standard model
Journal of Systems and Software
Verifier-key-flexible universal designated-verifier signatures
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
An ID-based multi-signer universal designated multi-verifier signature scheme
Information and Computation
Rigorous security requirements for designated verifier signatures
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Universal designated verifier signature without delegatability
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Designated verifier signature: definition, framework and new constructions
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Hi-index | 0.00 |
The notion of Universal Designated Verifier Signatures (UDVS) was introduced in the seminal paper of Steinfeld et. al. in [6]. In this paper, we firstly propose a model of identity-based (ID-based) UDVS schemes. We note that there are two methods to achieve an ID-based UDVS scheme. We provide two constructions of ID-based UDVS schemes based on bilinear pairings that use the two methods that we have identified. We provide our security proof based on the random oracle model.