Restricted Universal Designated Verifier Signature

  • Xinyi Huang
  • Willy Susilo
  • Yi Mu
  • Futai Zhang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4159)


Similar to hand-written signatures, digital signatures are designed to provide authenticity, integrity and non-repudiation. In the arena of ubiquitous computing, the ability of convincing any third party should be restricted. In a service such as an Internet trial-browsing service, a user is allowed to access the service of t times without any charge, but will be charged on the t+1 count of access. In this paper, we introduce the notion of restricted universal designated verifier signature. In this notion, a signature holder can convince up to t verifiers, and the convincing statement is designated to these verifiers. However, when the signature holder uses the signature for t+1 times, then the signature will become publicly available. We note that this type of signature schemes has many applications in practice.


Signature Scheme Ubiquitous Computing Bilinear Pairing Universal Designate Electronic Vote 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abe, M., Ohkubo, M., Suzuki, K.: 1-out-of-n Signatures from a Variety of Keys. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 415–432. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)Google Scholar
  3. 3.
    Desmedt, Y.: Verifier-Designated Signatures. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, Springer, Heidelberg (2003)Google Scholar
  4. 4.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE IT 22, 644–654 (1976)MATHCrossRefMathSciNetGoogle Scholar
  5. 5.
    Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and Their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)Google Scholar
  6. 6.
    Laguillaumie, F., Vergnaud, D.: Multi-Designated Verifiers Signatures. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 495–507. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Huang, X., Mu, Y., Susilo, W., Zhang, F.: Restricted Universal Designated Verifier Signature,
  8. 8.
    Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  9. 9.
    Sako, K., Yonezawa, S., Teranishi, I.: Anonymous Authentication: For Privacy and Security. NEC Journal of Advanced Technology, Special Issue on Security for Network Society 2(1), 79–83 (2005)Google Scholar
  10. 10.
    Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J.: Universal Designated-Verifier Signatures. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 523–543. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Steinfeld, R., Wang, H., Pieprzyk, J.: Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 86–100. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Xinyi Huang
    • 1
  • Willy Susilo
    • 1
  • Yi Mu
    • 1
  • Futai Zhang
    • 2
  1. 1.Centre for Information Security Research, School of Information Technology and Computer ScienceUniversity of WollongongAustralia
  2. 2.School of Mathematics and Computer ScienceNanjing Normal UniversityP.R. China

Personalised recommendations