Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 761487, 5 pages
http://dx.doi.org/10.1155/2014/761487
Research Article

On Delegatability of Some Strong Designated Verifier Signature Schemes

School of Computer Science and Software, Tianjin Polytechnic University, No. 399, Binshuixi Road, Tianjin 300387, China

Received 25 December 2013; Revised 27 February 2014; Accepted 7 March 2014; Published 1 April 2014

Academic Editor: Kwok-Wo Wong

Copyright © 2014 Baoyuan Kang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Saeednia, S. Kramer, and O. Markovitch, “An efficient strong designated verifier signature schemem,” in Information Security and Cryptology—ICISC 2003, pp. 40–54, Springer, Berlin, Germany, 2003. View at Google Scholar
  2. M. Jakobsson, K. Sako, and R. Impagliazzo, “Designated verifier proofs and their applications,” in Advances in Cryptology—EUROCRYPT ’96, vol. 1070 of Lecture Notes in Computer Science, pp. 143–154, Springer, 1996. View at Google Scholar
  3. Y. Lu and G. Tsudik, “Privacy-preserving cloud database querying,” Journal of Internet Services and Information Security, vol. 1, pp. 5–24, 2011. View at Google Scholar
  4. N. Gal-oz, T. Grinshpoun, and E. Gudes, “Privacy issues with sharing and computing reputation across communities,” Journal of Wireless Mobile Networks, vol. 1, pp. 16–34, 2011. View at Google Scholar
  5. L. Ogiela and M. R. Ogiela, “Fundamentals of cognitive informatica,” in Advances in Cognitive Information Systems, vol. 17 of Cognitive System Monographs, pp. 19–49, Springer, 2012. View at Google Scholar
  6. X. Huang, W. Susilo, Y. Mu, and F. Zhang, “Short designated verifier signature scheme and its identity-based variant,” International Journal of Network Security, vol. 6, no. 1, pp. 82–93, 2003. View at Google Scholar
  7. K. Kumar, G. Shailaja, and A. Saxena, “Identity based strong designated verifier signature scheme,” Informatica, vol. 18, no. 2, pp. 239–252, 2007. View at Google Scholar · View at Scopus
  8. W. Susilo, F. Zhang, and Y. Mu, “Identity-based strong designated verifier signature schemes,” in Information Security and Privacy, vol. 3108 of Lecture Notes in Computer Science, pp. 313–324, 2004. View at Google Scholar
  9. J. Zhang and J. Mao, “A novel ID-based designated verifier signature scheme,” Information Sciences, vol. 178, no. 3, pp. 766–773, 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Lal and V. Verma, “Identity Base Strong Designated Verifier Proxy Signature Schemes,” Cryptography eprint Archive Report 2006/394, http://eprint.iacr.org/2006/394.
  11. B. Kang, C. Boyd, and E. Dawson, “A novel identity-based strong designated verifier signature scheme,” The Journal of Systems and Software, vol. 82, no. 2, pp. 270–273, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. B. Kang, C. Boyd, and E. Dawson, “Identity-based strong designated verifier signature schemes: attacks and new construction,” Computers and Electrical Engineering, vol. 35, no. 1, pp. 49–53, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. J.-S. Lee, J. H. Chang, and D. H. Lee, “Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof,” Computers and Electrical Engineering, vol. 36, no. 5, pp. 948–954, 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. Q. Huang, G. Yang, D. S. Wong, and W. Susilo, “Identity-based strong designated verifier signature revisited,” The Journal of Systems and Software, vol. 84, no. 1, pp. 120–129, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. J.-S. Lee and J. H. Chang, “Comment on Saeednia et al.'s strong designated verifier signature scheme,” Computer Standards & Interfaces, vol. 31, no. 1, pp. 258–260, 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Lee and J. Chang, “Strong designated verifier signature scheme with message recovery,” Advanced Communication Technology, vol. 1, pp. 801–803, 2007. View at Google Scholar
  17. J. Ki, J. Y. Hwang, D. Nyang, B.-H. Chang, D. H. Lee, and J.-I. Lim, “Constructing strong identity-based designated verifier signatures with self-unverifiability,” ETRI Journal, vol. 34, no. 2, pp. 235–244, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. B. Yang, Z. Hu, and Z. Xiao, “Efficient certificateless strong designated verifier signature scheme,” in Proceedings of the International Conference on Computational Intelligence and Security (CIS '09), pp. 432–436, IEEE Computer Society, December 2009. View at Publisher · View at Google Scholar · View at Scopus