File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1002/cpe.3094
- Scopus: eid_2-s2.0-84899491449
- WOS: WOS:000334659000009
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: (Strong) multidesignated verifiers signatures secure against rogue key attack
Title | (Strong) multidesignated verifiers signatures secure against rogue key attack |
---|---|
Authors | |
Keywords | designated verifier signature rogue key attack public key cryptography |
Issue Date | 2014 |
Citation | Concurrency Computation: Practice and Experience, 2014, v. 26, n. 8, p. 1574-1592 How to Cite? |
Abstract | Designated verifier signatures (DVS) allow a signer to create a signature whose validity can only be verified by a specific entity chosen by the signer. In addition, the chosen entity, known as the designated verifier, cannot convince any body that the signature is created by the signer. Multidesignated verifiers signatures (MDVS) are a natural extension of DVS in which the signer can choose multiple designated verifiers. DVS and MDVS are useful primitives in electronic voting and contract signing. In this paper, we investigate various aspects of MDVS and make two contributions. Firstly, we revisit the notion of unforgeability under rogue key attack on MDVS. In this attack scenario, a malicious designated verifier tries to forge a signature that passes through the verification of another honest designated verifier. A common counter-measure involves making the knowledge of secret key assumption in which an adversary is required to produce a proof-of-knowledge of the secret key. We strengthened the existing security model to capture this attack and propose a new construction that does not rely on the knowledge of secret key assumption. Secondly, we propose a generic construction of strong MDVS. © 2013 John Wiley & Sons, Ltd. |
Persistent Identifier | http://hdl.handle.net/10722/280745 |
ISSN | 2023 Impact Factor: 1.5 2023 SCImago Journal Rankings: 0.533 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Yang, Guomin | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Zhang, Yunmei | - |
dc.date.accessioned | 2020-02-17T14:34:50Z | - |
dc.date.available | 2020-02-17T14:34:50Z | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | Concurrency Computation: Practice and Experience, 2014, v. 26, n. 8, p. 1574-1592 | - |
dc.identifier.issn | 1532-0626 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280745 | - |
dc.description.abstract | Designated verifier signatures (DVS) allow a signer to create a signature whose validity can only be verified by a specific entity chosen by the signer. In addition, the chosen entity, known as the designated verifier, cannot convince any body that the signature is created by the signer. Multidesignated verifiers signatures (MDVS) are a natural extension of DVS in which the signer can choose multiple designated verifiers. DVS and MDVS are useful primitives in electronic voting and contract signing. In this paper, we investigate various aspects of MDVS and make two contributions. Firstly, we revisit the notion of unforgeability under rogue key attack on MDVS. In this attack scenario, a malicious designated verifier tries to forge a signature that passes through the verification of another honest designated verifier. A common counter-measure involves making the knowledge of secret key assumption in which an adversary is required to produce a proof-of-knowledge of the secret key. We strengthened the existing security model to capture this attack and propose a new construction that does not rely on the knowledge of secret key assumption. Secondly, we propose a generic construction of strong MDVS. © 2013 John Wiley & Sons, Ltd. | - |
dc.language | eng | - |
dc.relation.ispartof | Concurrency Computation: Practice and Experience | - |
dc.subject | designated verifier signature | - |
dc.subject | rogue key attack | - |
dc.subject | public key cryptography | - |
dc.title | (Strong) multidesignated verifiers signatures secure against rogue key attack | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1002/cpe.3094 | - |
dc.identifier.scopus | eid_2-s2.0-84899491449 | - |
dc.identifier.volume | 26 | - |
dc.identifier.issue | 8 | - |
dc.identifier.spage | 1574 | - |
dc.identifier.epage | 1592 | - |
dc.identifier.eissn | 1532-0634 | - |
dc.identifier.isi | WOS:000334659000009 | - |
dc.identifier.issnl | 1532-0626 | - |