Based on Chameleon Hash and D. Boneh’s one round multi-party key agreement protocol, this paper proposes a multi-designated verifiers signature scheme. In this scheme only the verifiers designated by the signer can independently verify the signature. And no one else other than the designated person can be convinced by this signature even if one of the designated verifiers reveals the secret value. The analysis of the proposed scheme shows that it satisfies non-transferability, unforgeability and privacy of the signer’s identity and has to low computational cost.
YANG Bo, YANG Yixian, HU Zhengming, NIU Xinxin, XIAO Zibi
. A strong multi-designated verifiers signature
scheme[J]. Frontiers of Electrical and Electronic Engineering, 2008
, 3(2)
: 167
-170
.
DOI: 10.1007/s11460-008-0035-1
1. Jakobsson M Sako K Impagliazzo R Designated verifier proofs and their applications. In: Proceedings of Advances in Cryptology - Eurocrypt'96BerlinSpringer-Verlag 1996 1070143154
2. Saeednia S Kremer S Markowitch O An efficient strong designated verifier signature scheme. In: Proceedings of the 6th International Conferenceon Information Security and Cryptology - ICISC 2003BerlinSpringer-Verlag 2004 29714054
3. Laguillaumie F Vergnaud D Designated verifier signature:anonymity and efficient construction from any bilinear map. In: Proceedings of the 4th International Conferenceon Security in Communication Networks'04 (SCN04)BerlinSpringer-Verlag 2005 3352105119
4. Desmedt Y Verifier-DesignatedSignatures. Rump Session, Crypto'03 2003
5. Laguillaumie F Vergnaud D Multi-designated verifierssignatures. In: Proceedings of the 6thInternational Conference on Information and Communications Security- ICICS 2004BerlinSpringer-Verlag 2004 3269495507
6. Boneh D Silverberg A Applications of multilinearforms to cryptographyContemporary MathematicsCalifornia 2003 3247190
7. Krawczyk H Rabin T Chameleon signaturesIn: Proceeding of Network and Distributed SystemSecurity Symposium,California 2000 143154
8. Menezes J A van Oorschot P C Vanstone S A Handbook of Applied Cryptography. 5th edBoca RatonCRC Press 2001 451462