Restricted Universal Designated Verifier Signature
Similar to hand-written signatures, digital signatures are designed to provide authenticity, integrity and non-repudiation. In the arena of ubiquitous computing, the ability of convincing any third party should be restricted. In a service such as an Internet trial-browsing service, a user is allowed to access the service of t times without any charge, but will be charged on the t+1 count of access. In this paper, we introduce the notion of restricted universal designated verifier signature. In this notion, a signature holder can convince up to t verifiers, and the convincing statement is designated to these verifiers. However, when the signature holder uses the signature for t+1 times, then the signature will become publicly available. We note that this type of signature schemes has many applications in practice.
KeywordsSignature Scheme Ubiquitous Computing Bilinear Pairing Universal Designate Electronic Vote
Unable to display preview. Download preview PDF.
- 2.Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991)Google Scholar
- 3.Desmedt, Y.: Verifier-Designated Signatures. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, Springer, Heidelberg (2003)Google Scholar
- 5.Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and Their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)Google Scholar
- 7.Huang, X., Mu, Y., Susilo, W., Zhang, F.: Restricted Universal Designated Verifier Signature, http://www.uow.edu.au/~wsusilo/publications.html
- 9.Sako, K., Yonezawa, S., Teranishi, I.: Anonymous Authentication: For Privacy and Security. NEC Journal of Advanced Technology, Special Issue on Security for Network Society 2(1), 79–83 (2005)Google Scholar