Designated verifier proxy signature scheme with message recovery

Proxy signature is an active cryptographic research area. In recent years, many proxy signature schemes to suggest improvement and generalization of existing protocols have been proposed. In this paper, we will propose a new designated verifier proxy signature scheme with message recovery. Since the signed message is included in the proxy signature, and only the designated verifier can recover the signed message and verify the signature, compared with other proxy signatures, the proposed scheme not only reduces the communication cost but also satisfies the confidentiality property.

[1]  Min-Shiang Hwang,et al.  A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.

[2]  Jacques Stern,et al.  Security Proofs for Signature Schemes , 1996, EUROCRYPT.

[3]  Zhenfu Cao,et al.  A robust (k, n) + 1 threshold proxy signature scheme based on factoring , 2005, Appl. Math. Comput..

[4]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[5]  Guilin Wang,et al.  Designated-verifier proxy signatures for e-commerce , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[6]  Guoqiang Bai,et al.  Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .

[7]  Tzong-Chen Wu,et al.  New nonrepudiable threshold proxy signature scheme with known signers , 2001, J. Syst. Softw..

[8]  Hung-Min Sun,et al.  Threshold proxy signatures , 1999 .

[9]  Hwang Shin-Jia,et al.  New multi-proxy multi-signature schemes , 2004 .

[10]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[11]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[12]  Xiaohu Yang,et al.  Designated-receiver proxy signature scheme for electronic commerce , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[13]  Ji Jia A New Proxy Multi-Signature Scheme , 2004 .

[14]  Chien-Lung Hsu,et al.  New proxy multi-signature scheme , 2005, Appl. Math. Comput..

[15]  R Lu A simple efficient proxy-protected signature scheme based on factoring , 2004 .

[16]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[17]  Zuhua Shao,et al.  Proxy signature schemes based on factoring , 2003, Inf. Process. Lett..