Security Analysis of Two Designated-Verifier Signature Schemes
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    In 2005, Wang, et al. proposed a threshold proxy multi designated-verifiers signature scheme (Wang-Fu) by combining the properties of the threshold proxy signature and the multi designated-verifiers signature. In the same year, Chen, et al. also proposed a designated-verifier signature scheme. It is shown that the manager of the set of all verifiers can directly forge signatures, so that, each verifier should give zero knowledge proof for the partial data generated in verifying phase by using his secret key, and that CFT (Chen-Feng-Tan) scheme does not satisfy the non-transferability, i.e., the designated-verifier can prove to a third party that the signature is generated by the signer. The reason is that the scheme directly follows from the technique in Schnorr signature. The designated-verifier can easily transform the signature into a common signature with respect to the signer's public parameters.

    Reference
    Related
    Cited by
Get Citation

曹正军,刘丽华.两个指定验证人签名方案的安全性分析.软件学报,2008,19(7):1753-1757

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:January 28,2007
  • Revised:April 26,2007
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063