Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Special Uses and Sbuses of the Fiat-Shamir Passport Protocol
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Weaknesses of undeniable signature schemes
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Designated verifier signature schemes: attacks, new security notions and a new construction
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Short designated verifier proxy signature from pairings
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
The security of the FDH variant of chaum's undeniable signature scheme
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Designated verifier signatures: anonymity and efficient construction from any bilinear map
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
Computer Standards & Interfaces
A novel ID-based designated verifier signature scheme
Information Sciences: an International Journal
Aggregate designated verifier signatures and application to secure routing
International Journal of Security and Networks
Identity-based universal designated multi-verifiers signature schemes
Computer Standards & Interfaces
Designated verifier proxy signature scheme without random oracles
Computers & Mathematics with Applications
Computers and Electrical Engineering
Strong designated verifier signature in a multi-user setting
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
ProvSec'10 Proceedings of the 4th international conference on Provable security
Identity-based strong multi-designated verifiers signatures
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Attribute-based strong designated-verifier signature scheme
Journal of Systems and Software
Anonymous identification and designated-verifiers signatures from insecure batch verification
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Universal designated verifier signcryption
NSS'12 Proceedings of the 6th international conference on Network and System Security
How to achieve non-repudiation of origin with privacy protection in cloud computing
Journal of Computer and System Sciences
Hi-index | 0.00 |
The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguillaumie and Vergnaud in 2004. In this paper, we firstly propose the notion of short strong designated verifier signature scheme, and extend it to the short identity-based strong designated verifier scheme. Then, we propose the first construction of short strong designated verifier signature scheme. We also extend our scheme to construct a short identity-based strong designated verifier signature scheme. The size of the signature of our schemes is the shortest compared to any existing schemes reported in the literature. We provide formal security proofs for our schemes based on the random oracle model. Finally, we also discuss an extension of our scheme to construct a short strong designated verifier signature without random oracle.