A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Relations Among Notions of Security for Public-Key Encryption Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Key-Privacy in Public-Key Encryption
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Efficient and generalized group signatures
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
A signature scheme as secure as the Diffie-Hellman problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Multi-designated verifiers signatures: anonymity without encryption
Information Processing Letters
A novel ID-based designated verifier signature scheme
Information Sciences: an International Journal
Aggregate designated verifier signatures and application to secure routing
International Journal of Security and Networks
Identity-based universal designated multi-verifiers signature schemes
Computer Standards & Interfaces
Rogue-key attacks on the multi-designated verifiers signature scheme
Information Processing Letters
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
How to Balance Privacy with Authenticity
Information Security and Cryptology --- ICISC 2008
Efficient zero-knowledge identification schemes which respect privacy
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Universal Designated Verifier Signatures with Threshold-Signers
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Chameleon-based deniable authenticated key agreement protocol secure against forgery
OCSC'07 Proceedings of the 2nd international conference on Online communities and social computing
Strong designated verifier signature in a multi-user setting
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Identity-based strong designated verifier signature revisited
Journal of Systems and Software
ProvSec'10 Proceedings of the 4th international conference on Provable security
Short designated verifier proxy signatures
Computers and Electrical Engineering
Rigorous security requirements for designated verifier signatures
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Universal designated verifier signature without delegatability
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
New extensions of pairing-based signatures into universal designated verifier signatures
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Designated verifier signature schemes: attacks, new security notions and a new construction
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Short designated verifier proxy signature from pairings
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Short (identity-based) strong designated verifier signature schemes
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Attribute-based strong designated-verifier signature scheme
Journal of Systems and Software
A new strong multiple designated verifiers signature
International Journal of Grid and Utility Computing
On delegatability of four designated verifier signatures
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Universal designated verifier signatures without random oracles or non-black box assumptions
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Non-interactive designated verifier proofs and undeniable signatures
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
A short non-delegatable strong designated verifier signature
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Non-delegatable strong designated verifier signature on elliptic curves
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Designated verifier signature: definition, framework and new constructions
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Anonymous identification and designated-verifiers signatures from insecure batch verification
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
ISC'07 Proceedings of the 10th international conference on Information Security
(Strong) multi-designated verifiers signatures secure against rogue key attack
NSS'12 Proceedings of the 6th international conference on Network and System Security
How to achieve non-repudiation of origin with privacy protection in cloud computing
Journal of Computer and System Sciences
Non-delegatable strong designated verifier signature using a trusted third party without pairings
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
A novel construction of SDVS with secure disavowability
Cluster Computing
Hi-index | 0.00 |
The concept of Designated Verifier Signatures (DVS) was introduced by Jakobsson, Sako and Impagliazzo at Eurocrypt'96. These signatures are intended to a specific verifier, who is the only one able to check their validity. In this context, we formalize the notion of privacy of signer's identity which captures the strong designated verifier property investigated in their paper. We propose a variant of the pairing-based DVS scheme introduced at Asiacrypt'03 by Steinfeld, Bull, Wang and Pieprzyk. Contrary to their proposal, our new scheme can be used with any admissible bilinear map, especially with the low cost pairings and achieves the new anonymity property (in the random oracle model). Moreover, the unforgeability is tightly related to the Gap-Bilinear Diffie-Hellman assumption, in the random oracle model and the signature length is around 75% smaller than the original proposal.