Skip to main content
Log in

Directed Digital Signature on Isogenies of Elliptic Curves

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

A protocol for directed digital signature is proposed on isogenies of elliptic curves, in which only a specific recipient, whose signature key was used to generate the signature, can verify the signature. The sender and recipient of the message control the delegation of the right to verify the received signature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.

Similar content being viewed by others

REFERENCES

  1. Yeow, K.W., et al., Applications of undeniable signature schemes, 2015 IEEE International Conference on Signal and Image Processing Applications (ICSIPA), 2015, pp. 133–138.

  2. Boyar, J., et al., Convertible undeniable signatures, Conference on the Theory and Application of Cryptography, Berlin–Heidelberg, 1990, pp. 189–205.

  3. Chaum, D., Designated confirmer signatures, Workshop on the Theory and Application of Cryptographic Techniques, Berlin–Heidelberg, 1994, pp. 86–91.

  4. Araki, S., Uehara, S., and Imamura, K., The limited verifier signature and its application, IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 1999, vol. 82, no. 1, pp. 63–68.

    Google Scholar 

  5. Liu, D.Y.W., et al., Nominative signature: Application, security model and construction, IACR Cryptology ePrint Archive: Report 2007/069, 2007. https://eprint.iacr.org/2007/069.pdf.

  6. Sun, X., et al., Identity-based directed signature scheme from bilinear pairings, IACR Cryptology ePrint Archive: Report 2008/305, 2008. https://eprint.iacr.org/2008/305.pdf.

  7. Lim, C.H. and Lee, P.J., Modified Maurer-Yacobi’s scheme and its applications, International Workshop on the Theory and Application of Cryptographic Techniques, Berlin–Heidelberg, 1992, pp. 308–323.

  8. Childs, A., Jao, D., and Soukharev, V., Constructing elliptic curve isogenies in quantum subexponential time, J. Math. Cryptol., 2014, vol. 8, no. 1, pp. 1–29.

    Article  MathSciNet  MATH  Google Scholar 

  9. Rao, B.U. and Gowri, T., An efficient ID-based directed signature scheme from bilinear pairings, IACR Cryptology ePrint Archive: Report 2009/617, 2009. https://eprint.iacr.org/2009.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. B. Aleksandrova.

Additional information

Translated by Sh. Galyaltdinov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aleksandrova, E.B., Shtyrkina, A.A. Directed Digital Signature on Isogenies of Elliptic Curves. Aut. Control Comp. Sci. 52, 1059–1064 (2018). https://doi.org/10.3103/S0146411618080412

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411618080412

Keywords:

Navigation