Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ki, JuHee | - |
dc.contributor.author | Hwang, Jung Yeon | - |
dc.contributor.author | Nyang, DaeHun | - |
dc.contributor.author | Chang, Beom-Hwan | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.contributor.author | Lim, Jong-in | - |
dc.date.accessioned | 2021-09-06T21:45:28Z | - |
dc.date.available | 2021-09-06T21:45:28Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2012-04 | - |
dc.identifier.issn | 1225-6463 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/108831 | - |
dc.description.abstract | An identity-based strong designated verifier signature scheme provides restricted verifiability only for a verifier designated by a signer and proper privacy for the signer. In this paper, we show that strong designated verifier signature schemes do not satisfy the self-unverifiability requirement in the sense that not only exposure of the verifier's secret key but also of the signer's secret key enables an attacker to verify signatures, which should have been the exclusive right of the verifier. We also present a generic method to construct a strong identity-based designated verifier signature scheme with self-unverifiability from identity-based key encapsulation and identity-based key sharing schemes. We prove that a scheme constructed from our method achieves unforgeability, non-transferability, and self-unverifiability if the two underlying components are secure. To show the advantage of our method, we present an example that outputs short signatures and we analyze its performance. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY | - |
dc.subject | ENCRYPTION | - |
dc.subject | FRAMEWORK | - |
dc.subject | SECURITY | - |
dc.title | Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.contributor.affiliatedAuthor | Lim, Jong-in | - |
dc.identifier.doi | 10.4218/etrij.12.0111.0597 | - |
dc.identifier.scopusid | 2-s2.0-84860208699 | - |
dc.identifier.wosid | 000302846900011 | - |
dc.identifier.bibliographicCitation | ETRI JOURNAL, v.34, no.2, pp.235 - 244 | - |
dc.relation.isPartOf | ETRI JOURNAL | - |
dc.citation.title | ETRI JOURNAL | - |
dc.citation.volume | 34 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 235 | - |
dc.citation.endPage | 244 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART001648907 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | ENCRYPTION | - |
dc.subject.keywordPlus | FRAMEWORK | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordAuthor | Identity-based designated verifier signature | - |
dc.subject.keywordAuthor | privacy | - |
dc.subject.keywordAuthor | strongness | - |
dc.subject.keywordAuthor | self-unverifiability | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.