Advanced Search
Volume 31 Issue 2
Dec.  2010
Turn off MathJax
Article Contents
Chen Guo-min, Chen Xiao-feng. A New Secure Universal Designated Verifier Signature Proof System[J]. Journal of Electronics & Information Technology, 2009, 31(2): 489-492. doi: 10.3724/SP.J.1146.2007.01585
Citation: Chen Guo-min, Chen Xiao-feng. A New Secure Universal Designated Verifier Signature Proof System[J]. Journal of Electronics & Information Technology, 2009, 31(2): 489-492. doi: 10.3724/SP.J.1146.2007.01585

A New Secure Universal Designated Verifier Signature Proof System

doi: 10.3724/SP.J.1146.2007.01585
  • Received Date: 2007-09-29
  • Rev Recd Date: 2008-04-14
  • Publish Date: 2009-02-19
  • The notion of Universal Designated Verifier Signature (UDVS) allows any holder of a signature to convince any designated verifier that the signer indeed generated the signature without revealing the signature itself, while the verifier can not transfer the proof to convince anyone else of this fact. Such signature schemes can protect the privacy of signature holders and have applications to certification systems. However, they require the designated verifier to create a public key using the signers public key parameter and have it certified to ensure the resulting public key is compatible with the setting that the signer provided. This is unrealistic in some situations. Very recently, Baek et al introduced the concept of Universal Designated Verifier Signature Proof (UDVSP) to solve this problem in Asiacrypt 2005. In this paper, it is first showed that there exits a security flaw in this UDVSP, i.e., it does not satisfy the non-transferability. A new secure UDVSP system is proposed and the system is proved to achieve the desired security notions.
  • loading
  • Chaum D and Antwerpen H. Undeniable signatures. Crypto1989, Springer-Verlag, 1990, LNCS 435: 212-216.[2]Jakobsson M, Sako K, and Impagliazzo R. Designated verifierproofs and their applications. Cryptology-Eurocrypt 1996,Springer- Verlag, 1996, LNCS 1070: 143-154.[3]Huang X, Susilo W, Mu Y, and Zhang F. Short (identity-based) strong designated verifier signature schemes.Information Security Practice and Experience (ISPEC 2006),Springer-Verlag, 2006, LNCS 3903: 214-225.[4]Kurosawa K and Heng S. Relations among security notionsfor undeniable signature schemes. Security and cryptographyfor networks (SCN 2006), Springer-Verlag, 2006, LNCS 4116:34-48.[5]Kurosawa K and Takagi T. New approach for selectivelyconvertible undeniable signature schemes. ASIACRYPT 2006,Springer-Verlag, 2006, LNCS 4284: 428-443.[6]Monnerat J and Vaudenay S. Short 2-move undeniablesignatures. VIETCRYPT 2006, Springer-Verlag, 2006, LNCS4341: 19-36.[7]Laguillaumie F, Libert B, and Quisquater J. Universaldesignated verifier signatures without random oracles ornon-black box assumptions. Security and Cryptography forNetworks (SCN 2006), Springer-Verlag, 2006, LNCS 4116:63-77.[8]Steinfeld R, Bull L, Wang H, and Pieprzyk J. Universaldesignated-verifier signatures. Cryptology Asiacrypt 2003,Springer-Verlag, 2003, LNCS 2894: 523-542.[9]Baek J, Safavi-Naini R, and Susilo. Universal designatedverifier signature proof (or How to efficiently proveknowledge of a signature). Cryptology-Asiacrypt 2005,Springer-Verlag, 2005, LNCS 3788: 644-661.[10]Fiat A and Shamir A. How to prove yourself: Practicalsolutions of identification and signature problems.Cryptology-Crypto 1986, Springer-Verlag, 1986, LNCS 263:186-194.[11]Schneier B. Applied Cryptography-Protocols, Algorithms,and Source Code in C. John Wiley and Sons inc., Part I,Chapter 4, 1996.[12]Boneh D and Franklin M. Identity-based encryption from theweil pairing. Cryptology-Crypto 2001, Springer-Verlag, 2001,LNCS 2139: 213-229.[13]Bellare M, Namprempre C, Pointcheval D, and Semanko M.The power RSA inversion oracles and the security of chaumsRSA-based blind signature scheme. FC 2001, Springer-Verlag,2002, LNCS 2339: 319-338.[14]Goldwasser S, Micali S, and Rivest R. A digital signaturescheme secure against adaptive chosen-message attack[J].SIAMJournal on Computing.1988, 17(2):281-308[15]Boneh D, Lynn B, and Shacham H. Short Signatures from theWeil Pairing. Advances in Asiacrypt 2001, Springer-Verlag,2001, LNCS 2248: 566-582.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3411) PDF downloads(813) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return