{"title":"On the security of pairing-based non-interactive designated verifier proofs of undeniable signature schemes","authors":"R. Behnia, Swee-Huay Heng, Che-Sheng Gan","doi":"10.1109/STUDENT.2012.6408405","DOIUrl":null,"url":null,"abstract":"Since the introduction of undeniable signature schemes, various proof systems with different properties and features have been introduced to be incorporated in the structure of undeniable signature schemes. Nonetheless, the non-interactive designated verifier proof system of Jakobsson et al. with its distinguishing properties and features was recognized as the most practical proof system. Due to its interesting features, a variation of Jakobsson et al. proof system has been employed in all of the proposed identity-based and certificateless undeniable signature schemes. We analyze the security of the variation of such proof system in the identity-based setting, and present a secure pairing-based non-interactive proof system with complete set of security proofs.","PeriodicalId":282263,"journal":{"name":"2012 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STUDENT.2012.6408405","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Since the introduction of undeniable signature schemes, various proof systems with different properties and features have been introduced to be incorporated in the structure of undeniable signature schemes. Nonetheless, the non-interactive designated verifier proof system of Jakobsson et al. with its distinguishing properties and features was recognized as the most practical proof system. Due to its interesting features, a variation of Jakobsson et al. proof system has been employed in all of the proposed identity-based and certificateless undeniable signature schemes. We analyze the security of the variation of such proof system in the identity-based setting, and present a secure pairing-based non-interactive proof system with complete set of security proofs.