Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Threshold Proxy Signature Schemes
ISW '97 Proceedings of the First International Workshop on Information Security
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Invisibility and anonymity of undeniable and confirmer signatures
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Designated verifier signatures: anonymity and efficient construction from any bilinear map
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Designated verifier proxy signature scheme without random oracles
Computers & Mathematics with Applications
How to Balance Privacy with Authenticity
Information Security and Cryptology --- ICISC 2008
Universal Designated Verifier Signatures with Threshold-Signers
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Short designated verifier proxy signatures
Computers and Electrical Engineering
Universal designated verifier signature without delegatability
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Short (identity-based) strong designated verifier signature schemes
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Pairing-based strong designated verifier proxy signature scheme with low cost
Security and Communication Networks
A novel construction of SDVS with secure disavowability
Cluster Computing
Hi-index | 0.00 |
In a designated verifier proxy signature scheme, the original signer delegates her/his signing capability to the proxy signer in such a way that the latter can sign messages on behalf of the former, but only the designated verifier can believe the validity of these signatures. In this paper, we firstly describe the notion of short designated verifier proxy signature, which we call SDVPS. Then a concrete scheme is presented. We prove that the proposed scheme is unforgeable even to the original signer under the Gap Bilinear Diffie-Hellman assumption and Random Oracle Model.