An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability

We propose a non-delegatable identity based strong designated verifier signature scheme. It combines an identity based Schnorr signature and an identification method. An OR proof technique glues the two parts. It is the second scheme secure in a strict model proposed by Huang et al. And it saves about half the communication and computation costs comparing to the first scheme.

[1]  Parag C. Pendharkar,et al.  Human-computer interaction issues for mobile computing in a variable work context , 2004, Int. J. Hum. Comput. Stud..

[2]  Ivan Damgård,et al.  Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.

[3]  Yi Mu,et al.  Short Designated Verifier Signature Scheme and Its Identity-based Variant , 2008, Int. J. Netw. Secur..

[4]  Markus Jakobsson,et al.  Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.

[5]  Ehud Gudes,et al.  Privacy Issues with Sharing and Computing Reputation across Communities , 2010, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[6]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[7]  Olivier Markowitch,et al.  An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.

[8]  Sebastian Pauli,et al.  Algorithmic Number Theory, 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings , 2006, ANTS.

[9]  Yi Mu,et al.  Identity-Based Strong Designated Verifier Signature Schemes , 2004, ACISP.

[10]  Fabien Laguillaumie,et al.  Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map , 2004, SCN.

[11]  Gene Tsudik,et al.  Privacy-Preserving Cloud Database Querying , 2011, J. Internet Serv. Inf. Secur..

[12]  Ashutosh Saxena,et al.  Identity Based Strong Designated Verifier Signature Scheme , 2007, Informatica.

[13]  Ivan Damgård,et al.  Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks , 1991, CRYPTO.

[14]  Jianhong Zhang,et al.  A novel ID-based designated verifier signature scheme , 2008, Inf. Sci..

[15]  Mihir Bellare,et al.  Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.

[16]  Jianhong Zhang,et al.  On the Security of Group Signature Scheme and Designated Verifier Signature Scheme , 2008, 2008 International Conference on Networking, Architecture, and Storage.

[17]  Steven D. Galbraith,et al.  Hidden Pairings and Trapdoor DDH Groups , 2006, ANTS.

[18]  Jianhua Li,et al.  Delegatability of an Identity Based Strong Designated Verifier Signature Scheme , 2010, Informatica.

[19]  Yi Mu,et al.  Designated Verifier Signature: Definition, Framework and New Constructions , 2007, UIC.

[20]  Ed Dawson,et al.  A novel identity-based strong designated verifier signature scheme , 2009, J. Syst. Softw..

[21]  Guomin Yang,et al.  Identity-based strong designated verifier signature revisited , 2011, J. Syst. Softw..

[22]  Feng Bao,et al.  Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.