Skip to main content

2024 | OriginalPaper | Buchkapitel

A Study on Designated Verifier Signature Schemes and Their Variants

verfasst von : Vandani Verma, Nitya Chugh

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Designated verifier signatures (DVSs) represent a specific type of digital signature that holds significance exclusively for a designated verifier. This feature emphasizes the importance of the intended receiver authenticating the signature, rendering it impenetrable to verification by any other party. DVSs provide a number of potential benefits over standard digital signatures, including increased security, flexibility, and efficiency. This paper conducts a thorough examination of cutting-edge research in the field of DVSs. It digs into the many types of DVSs that have been proposed, including ID-based DVSs, proxy DVSs, designated verifier strong signatures, bi-designated signatures, bi-designated proxy signatures, designated proxy threshold signatures, and multi-proxy signatures and exploration of the several applications that make use of DVS capabilities. In addition, we also propose DVS proxy signature scheme, secure against Type 5 and Type 6 challenger attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Jakobsson M, Sako K, Impagliazzo R (1996) Designated verifier proofs and their applications. Advances in cryptology—EUROCRYPT 96. Lecture notes in computer science, vol 1070. Springer, pp 143–154 Jakobsson M, Sako K, Impagliazzo R (1996) Designated verifier proofs and their applications. Advances in cryptology—EUROCRYPT 96. Lecture notes in computer science, vol 1070. Springer, pp 143–154
3.
Zurück zum Zitat Saeednia S, Kreme S, Markotwich O (2003) An efficient strong designated verifier signature scheme. In: ICICS 2003. LNCS, vol 2971. Springer, pp 40–54 Saeednia S, Kreme S, Markotwich O (2003) An efficient strong designated verifier signature scheme. In: ICICS 2003. LNCS, vol 2971. Springer, pp 40–54
4.
Zurück zum Zitat Susilo W, Zhang F, Mu Y (2004) Identity-based strong designated verifier signature schemes. In: 9th Australasian conference on information security and privacy, ACISP 2004. Lecture notes in computer science, vol 3108. Springer, pp 313–324 Susilo W, Zhang F, Mu Y (2004) Identity-based strong designated verifier signature schemes. In: 9th Australasian conference on information security and privacy, ACISP 2004. Lecture notes in computer science, vol 3108. Springer, pp 313–324
6.
Zurück zum Zitat Kang B, Boyd C, Dawson E (2009) Identity-based strong designated verifier signature schemes: attacks and new construction. Comput Electr Eng 35:49–53CrossRef Kang B, Boyd C, Dawson E (2009) Identity-based strong designated verifier signature schemes: attacks and new construction. Comput Electr Eng 35:49–53CrossRef
8.
Zurück zum Zitat Verma V, Lal S (2010) A study of some identity based signature schemes. J Manag Dev Inf Technol (ISSN: 0976-8440) 8:1–16 Verma V, Lal S (2010) A study of some identity based signature schemes. J Manag Dev Inf Technol (ISSN: 0976-8440) 8:1–16
9.
Zurück zum Zitat Yang Y, Wong DS, Guan C (2006) Efficient identity-based designated verifier signature scheme with public verification. J Comput Sci Technol 21(2):193–199 Yang Y, Wong DS, Guan C (2006) Efficient identity-based designated verifier signature scheme with public verification. J Comput Sci Technol 21(2):193–199
10.
Zurück zum Zitat Mishra P, Verma V (2020) A proficient identity-based signature scheme with designated verifier for e-voting. J Crit Rev 7(7):644–647 Mishra P, Verma V (2020) A proficient identity-based signature scheme with designated verifier for e-voting. J Crit Rev 7(7):644–647
11.
Zurück zum Zitat Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques. Springer, pp 47–53 Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques. Springer, pp 47–53
12.
Zurück zum Zitat Ma J, Cao Z (2007) Efficient and secure identity-based designated verifier proxy signature scheme from bilinear pairings. J Syst Softw 80(1):102–111 Ma J, Cao Z (2007) Efficient and secure identity-based designated verifier proxy signature scheme from bilinear pairings. J Syst Softw 80(1):102–111
13.
Zurück zum Zitat Chen K, Cao Z (2008) An efficient identity-based designated verifier proxy signature scheme. Inf Sci 178(23):4536–4542 Chen K, Cao Z (2008) An efficient identity-based designated verifier proxy signature scheme. Inf Sci 178(23):4536–4542
14.
Zurück zum Zitat Gong Z, Chen L, Ma J (2010) Efficient and expressive identity-based designated verifier proxy signature scheme without pairings. J Syst Softw 83(10):1934–1941 Gong Z, Chen L, Ma J (2010) Efficient and expressive identity-based designated verifier proxy signature scheme without pairings. J Syst Softw 83(10):1934–1941
15.
Zurück zum Zitat Lal S, Verma V (2007) Identity based strong designated verifier proxy signature scheme. IMS Math Student (India) 74(1):237–244MathSciNet Lal S, Verma V (2007) Identity based strong designated verifier proxy signature scheme. IMS Math Student (India) 74(1):237–244MathSciNet
17.
Zurück zum Zitat Yang C, Guo F, Xu J (2011) Formal analysis and security proof of an identity-based designated verifier proxy signature scheme. J Netw Comput Appl 34(1):274–281 Yang C, Guo F, Xu J (2011) Formal analysis and security proof of an identity-based designated verifier proxy signature scheme. J Netw Comput Appl 34(1):274–281
18.
Zurück zum Zitat Yu H, Ma J, Liu J (2014) Efficient and verifiable identity-based designated verifier proxy signature scheme with enhanced security. J Netw Comput Appl 41:287–296 Yu H, Ma J, Liu J (2014) Efficient and verifiable identity-based designated verifier proxy signature scheme with enhanced security. J Netw Comput Appl 41:287–296
19.
Zurück zum Zitat Cui Y, Zhang J, Wu Q (2016) A short and efficient identity-based designated verifier proxy signature scheme with constant-size signatures. IEEE Trans Inf Forensics Secur 11(5):1015–1023 Cui Y, Zhang J, Wu Q (2016) A short and efficient identity-based designated verifier proxy signature scheme with constant-size signatures. IEEE Trans Inf Forensics Secur 11(5):1015–1023
20.
Zurück zum Zitat Han S, Liu J, Xiong H (2017) An enhanced security identity-based designated verifier proxy signature scheme with tighter security reduction. Int J Commun Syst 30(4):e3174 Han S, Liu J, Xiong H (2017) An enhanced security identity-based designated verifier proxy signature scheme with tighter security reduction. Int J Commun Syst 30(4):e3174
21.
Zurück zum Zitat Hu C, Liu Z, Xiong H (2019) A new identity-based designated verifier proxy signature scheme with tight security reduction. Secur Commun Netw 1–10 Hu C, Liu Z, Xiong H (2019) A new identity-based designated verifier proxy signature scheme with tight security reduction. Secur Commun Netw 1–10
22.
Zurück zum Zitat Wang G (2004) Designated verifier proxy signature for e-commerce. In: IEEE international conferences on multimedia and expo (ICME 2004) CD-ROM, Taipei, Taiwan, pp 27–30. ISBN: 0-7803-8604-3 Wang G (2004) Designated verifier proxy signature for e-commerce. In: IEEE international conferences on multimedia and expo (ICME 2004) CD-ROM, Taipei, Taiwan, pp 27–30. ISBN: 0-7803-8604-3
23.
Zurück zum Zitat Kumar G, Singh BB, Singh H (2018) Bandwidth efficient designated verifier proxy signature scheme for healthcare wireless sensor networks. Ad Hock Netw 81:100–108 Kumar G, Singh BB, Singh H (2018) Bandwidth efficient designated verifier proxy signature scheme for healthcare wireless sensor networks. Ad Hock Netw 81:100–108
24.
Zurück zum Zitat Mambo M, Usuda K, Okamoto E (1996) Proxy signatures for delegating signing operation (revisited). In: Proceedings of the 3rd ACM conference on computer and communication security (CCS), pp 48–57 Mambo M, Usuda K, Okamoto E (1996) Proxy signatures for delegating signing operation (revisited). In: Proceedings of the 3rd ACM conference on computer and communication security (CCS), pp 48–57
28.
Zurück zum Zitat Verma V (2013) A new approach to multi designated verifier signature schemes. Int J Emerg Trends Technol Comput Sci (ISSN 2278-6856) 2(2):26–29 Verma V (2013) A new approach to multi designated verifier signature schemes. Int J Emerg Trends Technol Comput Sci (ISSN 2278-6856) 2(2):26–29
29.
Zurück zum Zitat Verma V, Rawat S (2019) ID-based multiuser signature schemes and their applications. Int J Sci Technol Res (IJSTR) 8(11):2174–2177. ISSN: 2277-8616 (Scopus indexed) Verma V, Rawat S (2019) ID-based multiuser signature schemes and their applications. Int J Sci Technol Res (IJSTR) 8(11):2174–2177. ISSN: 2277-8616 (Scopus indexed)
31.
Zurück zum Zitat Lal S, Verma V (2008) An identity based strong bi-designated verifier (t, n) threshold proxy signature scheme. arXiv:0806.1377v1 Lal S, Verma V (2008) An identity based strong bi-designated verifier (t, n) threshold proxy signature scheme. arXiv:0806.1377v1
Metadaten
Titel
A Study on Designated Verifier Signature Schemes and Their Variants
verfasst von
Vandani Verma
Nitya Chugh
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_23

Neuer Inhalt