Identity-based Universal Designated Verifier Signature Proof System
نویسندگان
چکیده
The notion of Universal Designated Verifier Signature (UDVS), introduced by Steinfeld et al. in Asiacrypt 2003, allows any holder of a signature to convince any designated verifier that the signer indeed generated the signature without revealing the signature itself, while the verifier cannot transfer the proof to convince anyone else of this fact. Such signature schemes can protect the privacy of signature holders and have applications in certification systems. Very recently, as pointed out by Baek et al. in Asiacrypt 2005, one significant inconvenience of all existing UDVS schemes is that they require the designated verifier to create a public key using the signer’s public key parameter and have it certified to ensure the resulting public key is compatible with the setting that the signer provided. This is unrealistic in some situations where the verifier is not willing to go through such setup process. Baek et al. introduced the concept of Universal Designated Verifier Signature Proof (UDVSP) to solve this problem. In this paper, we first introduce the idea of identity-based (ID-based) UDVSP system. Furthermore, we point out that the algorithm “Signature Transformation ST ” of the UDVSP defined by Baek et al. can be eliminated, which results in a more efficient UDVSP system. We present two ID-based UDVSP systems based on bilinear pairings, and provide the security proofs of our systems in the random oracle model.
منابع مشابه
Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures
We give a generic construction for universal designated-verifier signature schemes from a large class, C, of signature schemes. The resulting schemes are efficient and have two important properties. Firstly, they are provably DV-unforgeable, non-transferable and also non-delegatable. Secondly, the signer and the designated verifier can independently choose their cryptographic settings. We also ...
متن کاملConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
We give a generic construction for universal designated-verifier signature schemes from a large class, C, of signature schemes. The resulting schemes are efficient and have two important properties. Firstly, they are provably DV-unforgeable, non-transferable and also non-delegatable. Secondly, the signer and the designated verifier can independently choose their cryptographic settings. We also ...
متن کاملSecure universal designated verifier identity-based signcryption
In 2003, Steinfeld et al. introduced the notion of universal designated verifier signature (UDVS), which allows a signature holder, who receives a signature from the signer, to convince a designated verifier whether he is possession of a signer’s signature; at the same time, the verifier cannot transfer such conviction to anyone else. These signatures devote to protect the receiver’s privacy, t...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملIdentity-based universal designated multi-verifiers signature schemes
An identity-based (ID-based) universal designated verifier signature (ID-UDVS) scheme allows a signature holder to designate a specific verifier of the signature by using a simplified public identity such as e-mail address. In the paper, we present an efficient identity-based universal designated multi-verifiers signature (ID-UDMVS) scheme by extending a single verifier to a set of multi-verifi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 8 شماره
صفحات -
تاریخ انتشار 2009