ID-based Strong Designated Verifier Signature Scheme and its Applications in Internet of Things

被引:0
|
作者
Beheshti-Atashgah, Mohammad [1 ]
Aref, Mohammd Reza [2 ]
Bayat, Majid [3 ]
Barari, Morteza [1 ]
机构
[1] Malek Ashtar Univ Technol, Elect & Comp Engn Complex, Tehran, Iran
[2] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[3] Shahed Univ, Dept Comp Engn, Tehran, Iran
关键词
ID-based signature scheme; designated verifier signature; Intenet of Things; Smart home; Cloud; provable security; bilinear pairing; ATTACKS;
D O I
10.1109/iraniancee.2019.8786411
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Strong designated verifier signature scheme is a concept in which a user (signer) can issue a digital signature for a special receiver; i.e. signature is produced in such way that only intended verifier can check the validity of produced signature. Of course, this type of signature scheme should be such that no third party is able to validate the signature. In other words, the related designated verifier cannot assign the issued signature to another third party. This article proposes a new ID-based strong designated verifier signature scheme which has provable security in the ROM (Random Oracle Model) and BDH assumption. The proposed scheme satisfies the all security requirements of an ID based strong designated verifier signature scheme. In addition, we propose some usage scenarios for the proposed schemes in different applications in the Internet of Things and Cloud Computing era.
引用
收藏
页码:1486 / 1491
页数:6
相关论文
共 50 条
  • [1] A SECURE ID-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yang, Bo
    Xiao, Zibi
    Hu, Zhengming
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 543 - +
  • [2] Strong designated Verifier ID-based Ring Signature Scheme
    Wu Lei
    Li Daxing
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 294 - +
  • [3] A Novel ID-Based Strong Designated Verifier Signature Scheme
    Du, Hongzhen
    Huang, Meijuan
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2870 - 2874
  • [4] Strong Designated Verifier ID-based Threshold Ring Signature Scheme
    Wu, Lei
    Hu, Defa
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2013, 41 (11): : 222 - 229
  • [5] Strong designated verifier ID-based threshold ring signature scheme
    Wu, Lei
    Hu, Defa
    International Journal of Applied Mathematics and Statistics, 2013, 41 (11): : 222 - 229
  • [6] A novel ID-based designated verifier signature scheme
    Zhang, Jianhong
    Mao, Jane
    INFORMATION SCIENCES, 2008, 178 (03) : 766 - 773
  • [7] Provably secure blind ID-based strong designated verifier signature scheme
    Zhang, Ning
    Wen, Qiaoyan
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 358 - 362
  • [8] ID-based designated multi verifier proxy signature scheme
    Tang, Zhao-Xia
    Xu, Qiu-Liang
    Zhu, Jian-Dong
    Tongxin Xuebao/Journal on Communication, 2008, 29 (SUPPL.): : 41 - 45
  • [9] PROXY BLIND SIGNATURE SCHEME FOR ID-BASED DESIGNATED VERIFIER
    Zhang, Xiaozhi
    Xi, Junfu
    Wang, Zhengqiang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 376 - 379
  • [10] Efficient ID-based Designated Verifier Signature
    Blazy, Olivier
    Conchon, Emmanuel
    Germouty, Paul
    Jambert, Amandine
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,