Identity-based Convertible Limited Verifier Signature Scheme in the Standard Model

被引:2
|
作者
Shen Xiaoqin [1 ]
Ming Yang [2 ]
机构
[1] Xian Univ Technol, Sch Sci, Xian 710054, Shaanxi, Peoples R China
[2] Changan Univ, Sch Informat Engn, Xian 710054, Shaanxi, Peoples R China
关键词
identity-based cryptography; limited verifier signature; bilinear pairings;
D O I
10.4028/www.scientific.net/AMM.48-49.599
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A convertible limited verifier signature (CLVS) can be used to solve conflicts between authenticity and privacy in the digital signatures. In a CLVS scheme, the signature can be verified by a limited verifier. When necessary, the limited verifier can provide a proof to convince a judge that the signer has indeed generated the signature. However, the judge cannot transfer this proof to convince any other party. Also, the limited verifier signature should be converted into an ordinary one for public verification if required. In this paper, we proposed firstly identity-based converible limited verifier signature scheme in the standard model. We give the security proofs of our scheme and show that Our scheme achieved the desired security notions in the standard model (without random oracle).
引用
收藏
页码:599 / +
页数:2
相关论文
共 50 条
  • [1] A convertible limited verifier signature scheme
    Zhang, JH
    Li, HA
    Wang, JL
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2005, 3739 : 638 - 644
  • [2] Certificateless convertible limited verifier signature scheme
    Wu, Chenhuang
    Huang, Zhenjie
    TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 910 - +
  • [3] A Multi-Signer Convertible Limited Multi-Verifier Signature Scheme in the Standard Model
    Rastegari, Parvin
    Berenjkoub, Mehdi
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 143 - 148
  • [4] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
  • [5] Identity-Based Sanitizable Signature Scheme in the Standard Model
    Ming, Yang
    Shen, Xiaoqin
    Peng, Yamian
    INFORMATION COMPUTING AND APPLICATIONS, PT 1, 2010, 105 : 9 - +
  • [7] A novel identity-based strong designated verifier signature scheme
    Kang, Baoyuan
    Boyd, Colin
    Dawson, Ed
    JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (02) : 270 - 273
  • [8] Secure Identity-Based Blind Signature Scheme in the Standard Model
    Hu, Xiao-Ming
    Huang, Shang-Teng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (01) : 215 - 230
  • [9] On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
    Sun, Ying
    Yu, Yong
    Zhang, Xiaosong
    Chai, Jiwen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (03) : 721 - 723
  • [10] Identity-based ring signature scheme under standard model
    Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China
    Tongxin Xuebao, 2008, 4 (40-44):