Short (Identity-Based) Strong Designated Verifier Signature Schemes
The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguillaumie and Vergnaud in 2004. In this paper, we firstly propose the notion of s...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 225 |
---|---|
container_issue | |
container_start_page | 214 |
container_title | |
container_volume | |
creator | Huang, Xinyi Susilo, Willy Mu, Yi Zhang, Futai |
description | The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguillaumie and Vergnaud in 2004. In this paper, we firstly propose the notion of short strong designated verifier signature scheme, and extend it to the short identity-based strong designated verifier scheme. Then, we propose the first construction of short strong designated verifier signature scheme. We also extend our scheme to construct a short identity-based strong designated verifier signature scheme. The size of the signature of our schemes is the shortest compared to any existing schemes reported in the literature. We provide formal security proofs for our schemes based on the random oracle model. Finally, we also discuss an extension of our scheme to construct a short strong designated verifier signature without random oracle. |
doi_str_mv | 10.1007/11689522_20 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19938886</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19938886</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-76a8c2472bdce79ae9563f9af07cc7af0da9ab82ea04b8e635bb05397151ba3e3</originalsourceid><addsrcrecordid>eNpNkDtPwzAUhc1Loi2d-ANZkOgQuPaNY3uE8qpUiSHAatnJTRtok8oOQ_89hYLE9EnnOzrDYeycwxUHUNec59pIIayAAzZEmQEiSC0P2YDnnKeImTliY6P0nxN4zAaAIFKjMjxlwxjfAUAoIwZsWiy70CeXs4ravum36a2LVE2Sog9du0juKDaL1vVUJW8UmrqhkBQ_yWegpCiXtKZ4xk5qt4o0_uWIvT7cv0yf0vnz42x6M083gps-VbnTpciU8FVJyjgyMsfauBpUWaodKmec14IcZF5TjtJ7kGgUl9w7JByxi_3uxsXSrerg2rKJdhOatQtby41BrXW-6032vbhT7YKC9V33ES0H-32h_XchfgHbPV3y</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Short (Identity-Based) Strong Designated Verifier Signature Schemes</title><source>Springer Books</source><creator>Huang, Xinyi ; Susilo, Willy ; Mu, Yi ; Zhang, Futai</creator><contributor>Deng, Robert ; Chen, Kefei ; Lai, Xuejia ; Zhou, Jianying</contributor><creatorcontrib>Huang, Xinyi ; Susilo, Willy ; Mu, Yi ; Zhang, Futai ; Deng, Robert ; Chen, Kefei ; Lai, Xuejia ; Zhou, Jianying</creatorcontrib><description>The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguillaumie and Vergnaud in 2004. In this paper, we firstly propose the notion of short strong designated verifier signature scheme, and extend it to the short identity-based strong designated verifier scheme. Then, we propose the first construction of short strong designated verifier signature scheme. We also extend our scheme to construct a short identity-based strong designated verifier signature scheme. The size of the signature of our schemes is the shortest compared to any existing schemes reported in the literature. We provide formal security proofs for our schemes based on the random oracle model. Finally, we also discuss an extension of our scheme to construct a short strong designated verifier signature without random oracle.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540330523</identifier><identifier>ISBN: 3540330526</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540330585</identifier><identifier>EISBN: 9783540330585</identifier><identifier>DOI: 10.1007/11689522_20</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; designated verifier signature ; Exact sciences and technology ; identity based ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; random oracle model ; short signature ; Software ; strong designated verifier signature scheme</subject><ispartof>Information Security Practice and Experience, 2006, p.214-225</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2008 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11689522_20$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11689522_20$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19938886$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Deng, Robert</contributor><contributor>Chen, Kefei</contributor><contributor>Lai, Xuejia</contributor><contributor>Zhou, Jianying</contributor><creatorcontrib>Huang, Xinyi</creatorcontrib><creatorcontrib>Susilo, Willy</creatorcontrib><creatorcontrib>Mu, Yi</creatorcontrib><creatorcontrib>Zhang, Futai</creatorcontrib><title>Short (Identity-Based) Strong Designated Verifier Signature Schemes</title><title>Information Security Practice and Experience</title><description>The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguillaumie and Vergnaud in 2004. In this paper, we firstly propose the notion of short strong designated verifier signature scheme, and extend it to the short identity-based strong designated verifier scheme. Then, we propose the first construction of short strong designated verifier signature scheme. We also extend our scheme to construct a short identity-based strong designated verifier signature scheme. The size of the signature of our schemes is the shortest compared to any existing schemes reported in the literature. We provide formal security proofs for our schemes based on the random oracle model. Finally, we also discuss an extension of our scheme to construct a short strong designated verifier signature without random oracle.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>designated verifier signature</subject><subject>Exact sciences and technology</subject><subject>identity based</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>random oracle model</subject><subject>short signature</subject><subject>Software</subject><subject>strong designated verifier signature scheme</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540330523</isbn><isbn>3540330526</isbn><isbn>3540330585</isbn><isbn>9783540330585</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNkDtPwzAUhc1Loi2d-ANZkOgQuPaNY3uE8qpUiSHAatnJTRtok8oOQ_89hYLE9EnnOzrDYeycwxUHUNec59pIIayAAzZEmQEiSC0P2YDnnKeImTliY6P0nxN4zAaAIFKjMjxlwxjfAUAoIwZsWiy70CeXs4ravum36a2LVE2Sog9du0juKDaL1vVUJW8UmrqhkBQ_yWegpCiXtKZ4xk5qt4o0_uWIvT7cv0yf0vnz42x6M083gps-VbnTpciU8FVJyjgyMsfauBpUWaodKmec14IcZF5TjtJ7kGgUl9w7JByxi_3uxsXSrerg2rKJdhOatQtby41BrXW-6032vbhT7YKC9V33ES0H-32h_XchfgHbPV3y</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Huang, Xinyi</creator><creator>Susilo, Willy</creator><creator>Mu, Yi</creator><creator>Zhang, Futai</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Short (Identity-Based) Strong Designated Verifier Signature Schemes</title><author>Huang, Xinyi ; Susilo, Willy ; Mu, Yi ; Zhang, Futai</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-76a8c2472bdce79ae9563f9af07cc7af0da9ab82ea04b8e635bb05397151ba3e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>designated verifier signature</topic><topic>Exact sciences and technology</topic><topic>identity based</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>random oracle model</topic><topic>short signature</topic><topic>Software</topic><topic>strong designated verifier signature scheme</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Huang, Xinyi</creatorcontrib><creatorcontrib>Susilo, Willy</creatorcontrib><creatorcontrib>Mu, Yi</creatorcontrib><creatorcontrib>Zhang, Futai</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Huang, Xinyi</au><au>Susilo, Willy</au><au>Mu, Yi</au><au>Zhang, Futai</au><au>Deng, Robert</au><au>Chen, Kefei</au><au>Lai, Xuejia</au><au>Zhou, Jianying</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Short (Identity-Based) Strong Designated Verifier Signature Schemes</atitle><btitle>Information Security Practice and Experience</btitle><date>2006</date><risdate>2006</risdate><spage>214</spage><epage>225</epage><pages>214-225</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540330523</isbn><isbn>3540330526</isbn><eisbn>3540330585</eisbn><eisbn>9783540330585</eisbn><abstract>The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguillaumie and Vergnaud in 2004. In this paper, we firstly propose the notion of short strong designated verifier signature scheme, and extend it to the short identity-based strong designated verifier scheme. Then, we propose the first construction of short strong designated verifier signature scheme. We also extend our scheme to construct a short identity-based strong designated verifier signature scheme. The size of the signature of our schemes is the shortest compared to any existing schemes reported in the literature. We provide formal security proofs for our schemes based on the random oracle model. Finally, we also discuss an extension of our scheme to construct a short strong designated verifier signature without random oracle.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11689522_20</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Information Security Practice and Experience, 2006, p.214-225 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_19938886 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems designated verifier signature Exact sciences and technology identity based Memory and file management (including protection and security) Memory organisation. Data processing random oracle model short signature Software strong designated verifier signature scheme |
title | Short (Identity-Based) Strong Designated Verifier Signature Schemes |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T13%3A21%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Short%20(Identity-Based)%20Strong%20Designated%20Verifier%20Signature%20Schemes&rft.btitle=Information%20Security%20Practice%20and%20Experience&rft.au=Huang,%20Xinyi&rft.date=2006&rft.spage=214&rft.epage=225&rft.pages=214-225&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540330523&rft.isbn_list=3540330526&rft_id=info:doi/10.1007/11689522_20&rft_dat=%3Cpascalfrancis_sprin%3E19938886%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540330585&rft.eisbn_list=9783540330585&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |