Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability

Full metadata record
DC Field Value Language
dc.contributor.authorKi, JuHee-
dc.contributor.authorHwang, Jung Yeon-
dc.contributor.authorNyang, DaeHun-
dc.contributor.authorChang, Beom-Hwan-
dc.contributor.authorLee, Dong Hoon-
dc.contributor.authorLim, Jong-in-
dc.date.accessioned2021-09-06T21:45:28Z-
dc.date.available2021-09-06T21:45:28Z-
dc.date.created2021-06-18-
dc.date.issued2012-04-
dc.identifier.issn1225-6463-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/108831-
dc.description.abstractAn identity-based strong designated verifier signature scheme provides restricted verifiability only for a verifier designated by a signer and proper privacy for the signer. In this paper, we show that strong designated verifier signature schemes do not satisfy the self-unverifiability requirement in the sense that not only exposure of the verifier's secret key but also of the signer's secret key enables an attacker to verify signatures, which should have been the exclusive right of the verifier. We also present a generic method to construct a strong identity-based designated verifier signature scheme with self-unverifiability from identity-based key encapsulation and identity-based key sharing schemes. We prove that a scheme constructed from our method achieves unforgeability, non-transferability, and self-unverifiability if the two underlying components are secure. To show the advantage of our method, we present an example that outputs short signatures and we analyze its performance.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-
dc.subjectENCRYPTION-
dc.subjectFRAMEWORK-
dc.subjectSECURITY-
dc.titleConstructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.contributor.affiliatedAuthorLim, Jong-in-
dc.identifier.doi10.4218/etrij.12.0111.0597-
dc.identifier.scopusid2-s2.0-84860208699-
dc.identifier.wosid000302846900011-
dc.identifier.bibliographicCitationETRI JOURNAL, v.34, no.2, pp.235 - 244-
dc.relation.isPartOfETRI JOURNAL-
dc.citation.titleETRI JOURNAL-
dc.citation.volume34-
dc.citation.number2-
dc.citation.startPage235-
dc.citation.endPage244-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.identifier.kciidART001648907-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusENCRYPTION-
dc.subject.keywordPlusFRAMEWORK-
dc.subject.keywordPlusSECURITY-
dc.subject.keywordAuthorIdentity-based designated verifier signature-
dc.subject.keywordAuthorprivacy-
dc.subject.keywordAuthorstrongness-
dc.subject.keywordAuthorself-unverifiability-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE