Volume 38 Issue 5
May  2017
Article Contents

QIN Zhi-guang, LIAO Yong-jian. Cryptanalysis of an ID-Based Designated Verifier Signature Schemes[J]. Journal of University of Electronic Science and Technology of China, 2009, 38(5): 712-715. doi: 10.3969/j.issn.1001-0548.2009.05.033
Citation: QIN Zhi-guang, LIAO Yong-jian. Cryptanalysis of an ID-Based Designated Verifier Signature Schemes[J]. Journal of University of Electronic Science and Technology of China, 2009, 38(5): 712-715. doi: 10.3969/j.issn.1001-0548.2009.05.033

Cryptanalysis of an ID-Based Designated Verifier Signature Schemes

doi: 10.3969/j.issn.1001-0548.2009.05.033
  • Received Date: 2009-05-21
  • Publish Date: 2009-10-15
  • Compared with ordinary digital signature, the designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. In designated verifier signature scheme, no third party can even verify the validity of a designated verifier signature since it must use the designated verifier's secret key in verification. Recently, an ID-based strong designated verifier scheme, ID-based designated verifier proxy signature scheme, and partial cryptanalysis ware proposed. In this paper, we show that the designated verifier signature scheme is delegatable, and the designated verifier proxy signature is forgeable since construction of the proxy scheme is unreasonable.
  • 加载中
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Article Metrics

Article views(3492) PDF downloads(42) Cited by()

Related
Proportional views

Cryptanalysis of an ID-Based Designated Verifier Signature Schemes

doi: 10.3969/j.issn.1001-0548.2009.05.033

Abstract: Compared with ordinary digital signature, the designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. In designated verifier signature scheme, no third party can even verify the validity of a designated verifier signature since it must use the designated verifier's secret key in verification. Recently, an ID-based strong designated verifier scheme, ID-based designated verifier proxy signature scheme, and partial cryptanalysis ware proposed. In this paper, we show that the designated verifier signature scheme is delegatable, and the designated verifier proxy signature is forgeable since construction of the proxy scheme is unreasonable.

QIN Zhi-guang, LIAO Yong-jian. Cryptanalysis of an ID-Based Designated Verifier Signature Schemes[J]. Journal of University of Electronic Science and Technology of China, 2009, 38(5): 712-715. doi: 10.3969/j.issn.1001-0548.2009.05.033
Citation: QIN Zhi-guang, LIAO Yong-jian. Cryptanalysis of an ID-Based Designated Verifier Signature Schemes[J]. Journal of University of Electronic Science and Technology of China, 2009, 38(5): 712-715. doi: 10.3969/j.issn.1001-0548.2009.05.033

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return