You are not logged in.
Openly accessible

Short designated verifier signature scheme and its identity-based variant

Huang, Xinyi, Susilo, Willy, Mu, Yi and Zhang, Futai 2008, Short designated verifier signature scheme and its identity-based variant, International journal of network security, vol. 6, no. 1, pp. 82-93.

Attached Files
Name Description MIMEType Size Downloads
huang-shortdesignated-2008.pdf Published version application/pdf 437.32KB 85

Title Short designated verifier signature scheme and its identity-based variant
Author(s) Huang, Xinyi
Susilo, Willy
Mu, Yi
Zhang, Futai
Journal name International journal of network security
Volume number 6
Issue number 1
Start page 82
End page 93
Total pages 12
Publisher IJNS
Place of publication Taiwan, China
Publication date 2008-01
ISSN 1816-3548
Keyword(s) designated verifier signature
identity based
random oracle model
short signature
strong designated verifier signature scheme
Summary The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguil- laumie and Vergnaud in 2004. In this paper, we firstly propose the notion of short strong designated verifier sig- nature scheme, and extend it to the short identity-based strong designated verifier scheme. Then, we propose the first construction of short strong designated verifier sig- nature scheme. We also extend our scheme to construct a short identity-based strong designated verifier signature scheme. The size of the signature of our schemes is the shortest compared to any existing schemes reported in the literature. We provide formal security proofs for our schemes based on the random oracle model. Finally, we also discuss an extension of our scheme to construct a short strong designated verifier signature without random oracle.
Language eng
Field of Research 109999 Technology not elsewhere classified
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category C1.1 Refereed article in a scholarly journal
Copyright notice ©2008, IJNS
Persistent URL http://hdl.handle.net/10536/DRO/DU:30064462

Document type: Journal Article
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 40 Abstract Views, 85 File Downloads  -  Detailed Statistics
Created: Fri, 13 Jun 2014, 12:24:38 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.