Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes

Proxy signature schemes allow delegation of signing rights. The paper proposes the notion of Identity Based Strong Bi-Designated Verifier Proxy Signature (IDSBDVPS) schemes. In such schemes, only the two designated verifiers can verify that the proxy signer on behalf of the original signer signed the message but none of them is able to convince anyone else of this fact. The paper proposes nine such schemes and analyses the computational efficiency of each.

[1]  Olivier Markowitch,et al.  An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.

[2]  Ashutosh Saxena,et al.  Identity Based Strong Designated Verifier Signature Scheme , 2007, Informatica.

[3]  Markus Jakobsson,et al.  Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.

[4]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[5]  Sunder Lal,et al.  Some Identity Based Strong Bi-Designated Verifier Signature Schemes , 2007, IACR Cryptol. ePrint Arch..

[6]  Guilin Wang,et al.  Designated-verifier proxy signatures for e-commerce , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[7]  Kenneth G. Paterson,et al.  ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..

[8]  Fabien Laguillaumie,et al.  Multi-designated Verifiers Signatures , 2004, ICICS.

[9]  Rongxing Lu,et al.  Designated verifier proxy signature scheme with message recovery , 2005, Appl. Math. Comput..

[10]  Huang Yuying Identity-based Strong Designated Verifier Signature Scheme , 2010 .

[11]  Yi Mu,et al.  Short Designated Verifier Proxy Signature from Pairings , 2005, EUC Workshops.

[12]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[13]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[14]  Wang Qin,et al.  An identity-based strong designated verifier proxy signature scheme , 2006, Wuhan University Journal of Natural Sciences.

[15]  Xiaohu Yang,et al.  Designated-receiver proxy signature scheme for electronic commerce , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).