Short (Identity-Based) Strong Designated Verifier Signature Schemes

The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguillaumie and Vergnaud in 2004. In this paper, we firstly propose the notion of s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Huang, Xinyi, Susilo, Willy, Mu, Yi, Zhang, Futai
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 225
container_issue
container_start_page 214
container_title
container_volume
creator Huang, Xinyi
Susilo, Willy
Mu, Yi
Zhang, Futai
description The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguillaumie and Vergnaud in 2004. In this paper, we firstly propose the notion of short strong designated verifier signature scheme, and extend it to the short identity-based strong designated verifier scheme. Then, we propose the first construction of short strong designated verifier signature scheme. We also extend our scheme to construct a short identity-based strong designated verifier signature scheme. The size of the signature of our schemes is the shortest compared to any existing schemes reported in the literature. We provide formal security proofs for our schemes based on the random oracle model. Finally, we also discuss an extension of our scheme to construct a short strong designated verifier signature without random oracle.
doi_str_mv 10.1007/11689522_20
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19938886</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19938886</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-76a8c2472bdce79ae9563f9af07cc7af0da9ab82ea04b8e635bb05397151ba3e3</originalsourceid><addsrcrecordid>eNpNkDtPwzAUhc1Loi2d-ANZkOgQuPaNY3uE8qpUiSHAatnJTRtok8oOQ_89hYLE9EnnOzrDYeycwxUHUNec59pIIayAAzZEmQEiSC0P2YDnnKeImTliY6P0nxN4zAaAIFKjMjxlwxjfAUAoIwZsWiy70CeXs4ravum36a2LVE2Sog9du0juKDaL1vVUJW8UmrqhkBQ_yWegpCiXtKZ4xk5qt4o0_uWIvT7cv0yf0vnz42x6M083gps-VbnTpciU8FVJyjgyMsfauBpUWaodKmec14IcZF5TjtJ7kGgUl9w7JByxi_3uxsXSrerg2rKJdhOatQtby41BrXW-6032vbhT7YKC9V33ES0H-32h_XchfgHbPV3y</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Short (Identity-Based) Strong Designated Verifier Signature Schemes</title><source>Springer Books</source><creator>Huang, Xinyi ; Susilo, Willy ; Mu, Yi ; Zhang, Futai</creator><contributor>Deng, Robert ; Chen, Kefei ; Lai, Xuejia ; Zhou, Jianying</contributor><creatorcontrib>Huang, Xinyi ; Susilo, Willy ; Mu, Yi ; Zhang, Futai ; Deng, Robert ; Chen, Kefei ; Lai, Xuejia ; Zhou, Jianying</creatorcontrib><description>The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguillaumie and Vergnaud in 2004. In this paper, we firstly propose the notion of short strong designated verifier signature scheme, and extend it to the short identity-based strong designated verifier scheme. Then, we propose the first construction of short strong designated verifier signature scheme. We also extend our scheme to construct a short identity-based strong designated verifier signature scheme. The size of the signature of our schemes is the shortest compared to any existing schemes reported in the literature. We provide formal security proofs for our schemes based on the random oracle model. Finally, we also discuss an extension of our scheme to construct a short strong designated verifier signature without random oracle.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540330523</identifier><identifier>ISBN: 3540330526</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540330585</identifier><identifier>EISBN: 9783540330585</identifier><identifier>DOI: 10.1007/11689522_20</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; designated verifier signature ; Exact sciences and technology ; identity based ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; random oracle model ; short signature ; Software ; strong designated verifier signature scheme</subject><ispartof>Information Security Practice and Experience, 2006, p.214-225</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2008 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11689522_20$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11689522_20$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19938886$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Deng, Robert</contributor><contributor>Chen, Kefei</contributor><contributor>Lai, Xuejia</contributor><contributor>Zhou, Jianying</contributor><creatorcontrib>Huang, Xinyi</creatorcontrib><creatorcontrib>Susilo, Willy</creatorcontrib><creatorcontrib>Mu, Yi</creatorcontrib><creatorcontrib>Zhang, Futai</creatorcontrib><title>Short (Identity-Based) Strong Designated Verifier Signature Schemes</title><title>Information Security Practice and Experience</title><description>The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguillaumie and Vergnaud in 2004. In this paper, we firstly propose the notion of short strong designated verifier signature scheme, and extend it to the short identity-based strong designated verifier scheme. Then, we propose the first construction of short strong designated verifier signature scheme. We also extend our scheme to construct a short identity-based strong designated verifier signature scheme. The size of the signature of our schemes is the shortest compared to any existing schemes reported in the literature. We provide formal security proofs for our schemes based on the random oracle model. Finally, we also discuss an extension of our scheme to construct a short strong designated verifier signature without random oracle.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>designated verifier signature</subject><subject>Exact sciences and technology</subject><subject>identity based</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>random oracle model</subject><subject>short signature</subject><subject>Software</subject><subject>strong designated verifier signature scheme</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540330523</isbn><isbn>3540330526</isbn><isbn>3540330585</isbn><isbn>9783540330585</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNkDtPwzAUhc1Loi2d-ANZkOgQuPaNY3uE8qpUiSHAatnJTRtok8oOQ_89hYLE9EnnOzrDYeycwxUHUNec59pIIayAAzZEmQEiSC0P2YDnnKeImTliY6P0nxN4zAaAIFKjMjxlwxjfAUAoIwZsWiy70CeXs4ravum36a2LVE2Sog9du0juKDaL1vVUJW8UmrqhkBQ_yWegpCiXtKZ4xk5qt4o0_uWIvT7cv0yf0vnz42x6M083gps-VbnTpciU8FVJyjgyMsfauBpUWaodKmec14IcZF5TjtJ7kGgUl9w7JByxi_3uxsXSrerg2rKJdhOatQtby41BrXW-6032vbhT7YKC9V33ES0H-32h_XchfgHbPV3y</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Huang, Xinyi</creator><creator>Susilo, Willy</creator><creator>Mu, Yi</creator><creator>Zhang, Futai</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Short (Identity-Based) Strong Designated Verifier Signature Schemes</title><author>Huang, Xinyi ; Susilo, Willy ; Mu, Yi ; Zhang, Futai</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-76a8c2472bdce79ae9563f9af07cc7af0da9ab82ea04b8e635bb05397151ba3e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>designated verifier signature</topic><topic>Exact sciences and technology</topic><topic>identity based</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>random oracle model</topic><topic>short signature</topic><topic>Software</topic><topic>strong designated verifier signature scheme</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Huang, Xinyi</creatorcontrib><creatorcontrib>Susilo, Willy</creatorcontrib><creatorcontrib>Mu, Yi</creatorcontrib><creatorcontrib>Zhang, Futai</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Huang, Xinyi</au><au>Susilo, Willy</au><au>Mu, Yi</au><au>Zhang, Futai</au><au>Deng, Robert</au><au>Chen, Kefei</au><au>Lai, Xuejia</au><au>Zhou, Jianying</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Short (Identity-Based) Strong Designated Verifier Signature Schemes</atitle><btitle>Information Security Practice and Experience</btitle><date>2006</date><risdate>2006</risdate><spage>214</spage><epage>225</epage><pages>214-225</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540330523</isbn><isbn>3540330526</isbn><eisbn>3540330585</eisbn><eisbn>9783540330585</eisbn><abstract>The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguillaumie and Vergnaud in 2004. In this paper, we firstly propose the notion of short strong designated verifier signature scheme, and extend it to the short identity-based strong designated verifier scheme. Then, we propose the first construction of short strong designated verifier signature scheme. We also extend our scheme to construct a short identity-based strong designated verifier signature scheme. The size of the signature of our schemes is the shortest compared to any existing schemes reported in the literature. We provide formal security proofs for our schemes based on the random oracle model. Finally, we also discuss an extension of our scheme to construct a short strong designated verifier signature without random oracle.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11689522_20</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Information Security Practice and Experience, 2006, p.214-225
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19938886
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
designated verifier signature
Exact sciences and technology
identity based
Memory and file management (including protection and security)
Memory organisation. Data processing
random oracle model
short signature
Software
strong designated verifier signature scheme
title Short (Identity-Based) Strong Designated Verifier Signature Schemes
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T13%3A21%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Short%20(Identity-Based)%20Strong%20Designated%20Verifier%20Signature%20Schemes&rft.btitle=Information%20Security%20Practice%20and%20Experience&rft.au=Huang,%20Xinyi&rft.date=2006&rft.spage=214&rft.epage=225&rft.pages=214-225&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540330523&rft.isbn_list=3540330526&rft_id=info:doi/10.1007/11689522_20&rft_dat=%3Cpascalfrancis_sprin%3E19938886%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540330585&rft.eisbn_list=9783540330585&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true