Designated confirmer proxy signature scheme

被引:0
|
作者
Lee, Ji-Seon [1 ]
Chang, Jik Hyun [1 ]
机构
[1] Sogang Univ, Dept Comp Sci, Seoul, South Korea
关键词
proxy signatures; undeniable signatures; designated confirmer signatures;
D O I
10.1109/ICACT.2007.358323
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we propose a designated confirmer proxy signature scheme which combines the designated confirmer signature and the proxy signature. In the proposed scheme, an original signer delegates his/her signing capability to a proxy signer, and the proxy signer generates a signature on behalf of the original signer. To verify a signature, the proxy signer or the confirmer designated by the original signer should be involved in the verification step. We also discuss the security properties of the proposed scheme.
引用
收藏
页码:137 / +
页数:2
相关论文
共 50 条
  • [1] Convertible designated confirmer signature scheme
    Wang, Xiao-Ming
    Fu, Fang-Wei
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2002, 30 (11): : 1690 - 1693
  • [2] Designated verifier proxy signature scheme
    Liao, Yongjian
    Lu, Qing
    Qin, Zhiguang
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 235 - 238
  • [3] Chaum's designated confirmer signature revisited
    Monnerat, J
    Vaudenay, S
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 164 - 178
  • [4] Designated verifier proxy signature scheme with message recovery
    Lu, RX
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1237 - 1246
  • [5] A Strong Designated-verifier Proxy Signature scheme
    Zhang, Bo
    Xu, Qiuliang
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 569 - 572
  • [6] Attacks on One Designated Verifier Proxy Signature Scheme
    Kang, Baoyuan
    JOURNAL OF APPLIED MATHEMATICS, 2012,
  • [7] An improved designated-verifier proxy signature scheme
    Zhang, Jianhong
    INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 77 - 82
  • [8] Transformation of digital signature schemes into designated confirmer signature schemes
    Goldwasser, S
    Waisbard, E
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2004, 2951 : 77 - 100
  • [9] Designated confirmer threshold signature and its applications in blockchains
    Ji, Yunfeng
    Zhang, Rui
    Tao, Yang
    Gao, Birou
    CYBERSECURITY, 2024, 7 (01):
  • [10] Designated verifier proxy signature scheme without random oracles
    Yu, Yong
    Xu, Chunxiang
    Zhang, Xiaosong
    Liao, Yongjian
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2009, 57 (08) : 1352 - 1364