Abstract
In a designated verifier proxy signature scheme, the original signer delegates her/his signing capability to the proxy signer in such a way that the latter can sign messages on behalf of the former, but only the designated verifier can believe the validity of these signatures. In this paper, we firstly describe the notion of short designated verifier proxy signature, which we call SDVPS. Then a concrete scheme is presented. We prove that the proposed scheme is unforgeable even to the original signer under the Gap Bilinear Diffie-Hellman assumption and Random Oracle Model.
This work is supported by ARC Discovery Grant DP0557493.
Chapter PDF
Similar content being viewed by others
References
Chaum, D.: Zero-knowledge undeniable signatures. In: Damg, I. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 458–464. Springer, Berlin (1991)
Dai, J.Z., Yang, X.H., Dong, J.X.: Designated-receiver proxy signature scheme for electronic commerce. In: Proc. of IEEE International Conference on Systems, Man and Cybernetics, pp. 384–389. IEEE Press, Los Alamitos (2003)
Galbraith, S.D., Mao, W.: Invisibility and anonymity of undeniable and confirmer signatures. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 80–97. Springer, Heidelberg (2003)
Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)
Laguillaumie, F., Vergnaud, D.: Designated verifier signatures: Anonymity and efficient construction from any bilinear map. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 107–121. Springer, Heidelberg (2005)
Libert, B., Quisquater, J.-J.: Identity based undeniable signatures. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 112–125. Springer, Heidelberg (2004)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proc. of the Third ACM Conf. on Computer and Communications Security, pp. 48–57 (1996)
Saeednia, S., Kramer, S., Markovitch, O.: An efficient strong designated verifier signature scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004)
Steinfeld, R., Bull, H.W.L., Pieprzyk, J.: Universal designated-verifier signatures. In: Advances in Cryptology–ASIACRYPT 2003. LNCS, vol. 2893, pp. 523–543. Springer, Berlin (2003)
Steinfeld, R., Bull, H.W.L., Pieprzyk, J.: Efficient extension of standard schnorr/RSA signatures into universal designated-verifier signatures. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 86–100. Springer, Heidelberg (2004)
Susilo, W., Zhang, F., Mu, Y.: Identity-based strong designated verifier signature schemes. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 313–324. Springer, Heidelberg (2004)
Wang, G.: Designated-verifier proxy signatures for e-commerce. In: The IEEE 2004 International Conference on Multimedia and Expo (ICME 2004), pp. 1731–1734. IEEE Press, Los Alamitos (2004)
Wang, H., Pieprzyk, J.: Efficient one-time proxy signatures. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 507–522. Springer, Heidelberg (2003)
Zhang, F., Kim, K.: Id-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312–323. Springer, Heidelberg (2003)
Zhang, K.: Threshold proxy signature schemes. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 282–290. Springer, Heidelberg (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Huang, X., Mu, Y., Susilo, W., Zhang, F. (2005). Short Designated Verifier Proxy Signature from Pairings. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds) Embedded and Ubiquitous Computing – EUC 2005 Workshops. EUC 2005. Lecture Notes in Computer Science, vol 3823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596042_86
Download citation
DOI: https://doi.org/10.1007/11596042_86
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30803-4
Online ISBN: 978-3-540-32296-2
eBook Packages: Computer ScienceComputer Science (R0)