Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
455370 | Computers & Electrical Engineering | 2009 | 5 Pages |
Abstract
A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Baoyuan Kang, Colin Boyd, Ed Dawson,