{"title":"不可否认签名方案中基于配对的非交互式指定验证者证明的安全性","authors":"R. Behnia, Swee-Huay Heng, Che-Sheng Gan","doi":"10.1109/STUDENT.2012.6408405","DOIUrl":null,"url":null,"abstract":"Since the introduction of undeniable signature schemes, various proof systems with different properties and features have been introduced to be incorporated in the structure of undeniable signature schemes. Nonetheless, the non-interactive designated verifier proof system of Jakobsson et al. with its distinguishing properties and features was recognized as the most practical proof system. Due to its interesting features, a variation of Jakobsson et al. proof system has been employed in all of the proposed identity-based and certificateless undeniable signature schemes. We analyze the security of the variation of such proof system in the identity-based setting, and present a secure pairing-based non-interactive proof system with complete set of security proofs.","PeriodicalId":282263,"journal":{"name":"2012 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"On the security of pairing-based non-interactive designated verifier proofs of undeniable signature schemes\",\"authors\":\"R. Behnia, Swee-Huay Heng, Che-Sheng Gan\",\"doi\":\"10.1109/STUDENT.2012.6408405\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since the introduction of undeniable signature schemes, various proof systems with different properties and features have been introduced to be incorporated in the structure of undeniable signature schemes. Nonetheless, the non-interactive designated verifier proof system of Jakobsson et al. with its distinguishing properties and features was recognized as the most practical proof system. Due to its interesting features, a variation of Jakobsson et al. proof system has been employed in all of the proposed identity-based and certificateless undeniable signature schemes. We analyze the security of the variation of such proof system in the identity-based setting, and present a secure pairing-based non-interactive proof system with complete set of security proofs.\",\"PeriodicalId\":282263,\"journal\":{\"name\":\"2012 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT)\",\"volume\":\"56 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/STUDENT.2012.6408405\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STUDENT.2012.6408405","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On the security of pairing-based non-interactive designated verifier proofs of undeniable signature schemes
Since the introduction of undeniable signature schemes, various proof systems with different properties and features have been introduced to be incorporated in the structure of undeniable signature schemes. Nonetheless, the non-interactive designated verifier proof system of Jakobsson et al. with its distinguishing properties and features was recognized as the most practical proof system. Due to its interesting features, a variation of Jakobsson et al. proof system has been employed in all of the proposed identity-based and certificateless undeniable signature schemes. We analyze the security of the variation of such proof system in the identity-based setting, and present a secure pairing-based non-interactive proof system with complete set of security proofs.