نتایج جستجو برای: convertible limited multi verifier signature
تعداد نتایج: 931198 فیلتر نتایج به سال:
There is a signature scheme which can aggregate two or more persons’ signatures to one, called an aggregate signature. In this paper, we propose a scheme of an aggregate signature which has additional functionality allowing any holder of a signature to designate the signature to any desired designated-verifier. By this functionality, no one other than the designated-verifier can verify the sign...
Attribute based group signature (ABGS) is a a new generation of group signature schemes. In such a scheme the verifier could define the role of a signer within the group. He determines the attributes possessed by the member signing the document. In this paper we propose the first ABGS scheme with multi-authorities and define its security notions. We construct an ABGS that is proved to be fully ...
Elaborating on the merits of convertible multi-authenticated encryption (CMAE) schemes and keyinsulated systems, we propose a novel identity-based key-insulated convertible multi-authenticated encryption scheme (IB-KI-CMAE), which can effectively reduce the impact caused by the key exposure. Our scheme allows each user to periodically update his private key while the corresponding public one re...
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures
Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with ad-ditional functionality which allows any holder of a signature to designate the signature to any desireddesignated-verifier such that the designated-verifier can verify that the message was signed by thesigner, but is unable to convince anyone else of this fact.Since UDVS schemes reduce t...
A strong designated verifier signature (SDVS) scheme only allows a designated verifier to validate signer’s signatures for ensuring confidentiality. At the same time, the designated verifier can not transfer the signature to any third party, since he can also generate another computationally indistinguishable SDVS, which is referred to as non-transferability. A proxy signature scheme is a speci...
A non-delegatable identity-based strong designated verifier signature scheme Bin Wang Information Engineering College of Yangzhou University Yangzhou City, Jiangsu Province, 225009, P.R.China E-mail:[email protected] Abstract: In a strong designated verifier signature scheme, no third party can verify the validity of a signature. On the other hand, non-delegatability, proposed by Lipmaa, Wang an...
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designat...
This paper shows some insecurities in Xu’s forward secure multi-proxy signature scheme. There are two kinds of attacks on this scheme: (1) anyone can forge some certain messages which to be sign and cannot detect by the signature verifier. (2) This scheme can’t resist the dishonest signer forgery attack by forging its own public key. After that, the paper proposed two new forward-secure multi-p...
Recently Lee-Chang proposed a new strong designated verifier signature scheme. They claimed that their proposed scheme is more secure and suitable for the purpose of a strong designated verifier signature scheme. This paper shows that Lee-Chang scheme cannot withstand forgery attack which an adversary can forge a signature without knowing the secret key of the signer or the designated verifier ...
This paper proposes a designated verifier signature scheme based on the Schnorr signature and the Zheng signcryption schemes. One of the advantages of the new scheme compared with all previously proposed schemes is that it achieves the “strong designated verifier” property without encrypting any part of the signatures. This is because the designated verifier’s secret key is involved in the veri...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید