Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Special Uses and Sbuses of the Fiat-Shamir Passport Protocol
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
A novel ID-based designated verifier signature scheme
Information Sciences: an International Journal
Identity-based universal designated multi-verifiers signature schemes
Computer Standards & Interfaces
Secure universal designated verifier signature without random oracles
International Journal of Information Security
On the Security of Group Signature Scheme and Designated Verifier Signature Scheme
NAS '08 Proceedings of the 2008 International Conference on Networking, Architecture, and Storage
Chameleon hash without key exposure based on Schnorr signature
Computer Standards & Interfaces
A non-interactive deniable authentication scheme based on designated verifier proofs
Information Sciences: an International Journal
A novel identity-based strong designated verifier signature scheme
Journal of Systems and Software
Designated verifier proxy signature scheme without random oracles
Computers & Mathematics with Applications
An identity based universal designated verifier signature scheme secure in the standard model
Journal of Systems and Software
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Weaknesses of undeniable signature schemes
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Identity-based strong designated verifier signature revisited
Journal of Systems and Software
Identity-based chameleon hash scheme without key exposure
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Discrete logarithm based chameleon hashing and signatures without key exposure
Computers and Electrical Engineering
Universal designated verifier signature without delegatability
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
New extensions of pairing-based signatures into universal designated verifier signatures
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Designated verifier signature schemes: attacks, new security notions and a new construction
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Short designated verifier proxy signature from pairings
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Short signature and universal designated verifier signature without random oracles
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Designated verifier signatures: anonymity and efficient construction from any bilinear map
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
On the key exposure problem in chameleon hashes
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Universal designated verifier signatures without random oracles or non-black box assumptions
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Designated verifier signature: definition, framework and new constructions
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
A Strong Designated Verifier Signature Scheme with Secure Disavowability
INCOS '12 Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems
Hi-index | 0.00 |
Designated verifier signature (DVS) and strong designated verifier signature (SDVS) exhibit perfect non-transferability, but does not provide secure disavowability or non-repudiation, which makes them more like a message authentication code rather than a digital signature. In these kinds of cryptographic primitives, the signer has to bear the responsibility of some "forged" signatures produced by the designated verifier. Therefore, it's highly essential to construct a strong designated verifier signature scheme with secure disavowability. In this paper, we resolve this problem by proposing a novel construction of a strong designated verifier signature with secure disavowability. The new scheme makes use of a chameleon hash function and supports the signer to have a complete control of his signature. The proposed scheme achieves unforgeability, non-transferability and secure disavowability. Compared with the previous constructions, the new proposal achieves higher computational efficiency and shorter signature length.