完整後設資料紀錄
DC 欄位語言
dc.contributor.author吳, 宗杉 Jr
dc.contributor.author高, 俊海 Jr
dc.contributor.author林, 韓禹 Jr
dc.contributor.author黃, 世豪 Jr
dc.date.accessioned2011-03-24T23:42:03Z
dc.date.accessioned2020-05-18T03:22:04Z-
dc.date.available2011-03-24T23:42:03Z
dc.date.available2020-05-18T03:22:04Z-
dc.date.issued2011-03-24T23:42:03Z
dc.date.submitted2009-11-27
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/30131-
dc.description.abstractIn 1984, Shamir introduced the identity-based cryptosystem in which any third party can first acquire the signer’s public key with his public identity and then verify the resulting signature. In 2003, Saeednia et al. proposed the first strong designated verifier signature scheme based on discrete logarithm problem. In their scheme, only the designated verifier can verify the signer’s signature, so as to ensure the confidentiality. Besides, the designated verifier has the ability to generate another valid signature transcript intended for himself. Hence, the designated verifier cannot convince any third party of the signature’s authenticity. In this paper, we modify Waters’s identity-based encryption scheme to propose an identity-based strong designated verifier signature scheme from pairings. Our scheme satisfies the security requirements of unforgeability, non-transferability and source hiding.
dc.description.sponsorshipNational Taipei University,Taipei
dc.format.extent10p.
dc.relation.ispartofseriesNCS 2009
dc.subjectIdentity-based
dc.subjectDesignated Verifier
dc.subjectBilinear Pairings
dc.subject.otherWorkshop on Cryptography and Information Security
dc.titleIdentity-Based Strong Designated Verifier Signature Scheme from Pairings
dc.title.alternative基於雙線性配對之身份基底特定驗證者簽章方法
分類:2009年 NCS 全國計算機會議

文件中的檔案:
檔案 描述 大小格式 
CI0204.pdf282.54 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。