Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Efficient certificate-based signature scheme with strong designated verifier
ZHAI Zhengyuan GAO Dezhi LIANG Xiangqian PAN Shuai
Journal of Computer Applications    2013, 33 (03): 759-761.   DOI: 10.3724/SP.J.1087.2013.00759
Abstract691)      PDF (595KB)(509)       Save
Concerning the flaw that it needs a fully credible third party in ID-based strong designated verifier signature and the low efficiency of existing schemes, taking the advantage of Certificate Authority (CA)'s low trust level in certificate-based public key cryptography, a new strong designated verifier signature scheme was proposed in this paper. Furthermore, the formal security analysis under assumed Bilinear Diffie-Hellman (BDH) problem in the random oracle model was presented. Performance analysis shows the scheme meets all properties of strong designated verifier signature schemes and enjoys higher correspondence efficiency used in bandwidth limited environment since the signature length is just one of the group elements.
Reference | Related Articles | Metrics
Analysis and improvement of verifiable ring signature schemes
LI Xiao-lin LIANG Xiang-qian LIU Kui PAN Shuai
Journal of Computer Applications    2012, 32 (12): 3466-3469.   DOI: 10.3724/SP.J.1087.2012.03466
Abstract993)      PDF (828KB)(562)       Save
By analyzing the certificateless verifiable ring signature scheme (LUO DAWEN, HE MINGXING, LI XIAO. Certificateless verifiable ring signature scheme. Computer Engineering,2009, 35(15): 135-137) and the verifiable proxy ring signature scheme (LUO DAWEN, HE MINGXING, LI XIAO.A verifiable proxy ring signature scheme.Journal of Southwest University for Nationalities:Natural Science Edition, 2009, 35(3):608-611), it was found that these convertible ring signature schemes were susceptible to non-repudiation attack, i.e., any member in the ring can impersonate others identity to sign the message and the verifier believed the signature was signed by the latter. To address the above problems, improved schemes were proposed by using the private key of the signer to have a secret value. The security analysis proves that the improved schemes overcome the security defect of the original scheme and satisfy all security requirements of verifiable ring signature.
Related Articles | Metrics