zbmath.org

Document Zbl 1308.94102 - zbMATH Open

Examples

Geometry Search for the term Geometry in any field. Queries are case-independent.

Funct* Wildcard queries are specified by * (e.g. functions, functorial, etc.). Otherwise the search is exact.

"Topological group" Phrases (multi-words) should be set in "straight quotation marks".

au: Bourbaki & ti: Algebra Search for author and title. The and-operator & is default and can be omitted.

so: Eur* J* Mat* Soc* cc: 14 Search for publications in a particular source with a Mathematics Subject Classification code (cc) in 14.

dt: b & au: Hilbert The document type is set to books; alternatively: j for journal articles, a for book articles.

la: chinese Find documents in a given language. ISO 639-1 language codes can also be used.

Fields

any anywhere
an internal document identifier
au author, editor
ai internal author identifier
ti title
la language
so source
ab review, abstract
py publication year
rv reviewer
cc MSC code
ut uncontrolled term
dt document type (j: journal article; b: book; a: book article)

Operators

a & b logic and
a | b logic or
!ab logic not
abc* right wildcard
"ab c" phrase
(ab c) parentheses

See also our General Help.

A short non-delegatable strong designated verifier signature. (English) Zbl 1308.94102

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 261-279 (2012).

Summary: We propose a non-delegatable strong designated verifier signature (SDVS) featured by a two-element signature. Comparatively, current SDVS schemes without delegatability produce at least three-element signatures. The SDVS scheme provably satisfies the unforgeability property under a computational Diffie-Hellman (CDH) problem. Its non-delegatability holds conditioned on a knowledge extraction assumption (KEA). Its privacy of signer’s identity (PSI) is reduced to the hardness of a variant of CDH problem. The construction method utilizes a combination of a KEA-based identification protocol, an OR proof technique, and a Fiat-Shamir heuristic.
For the entire collection see [Zbl 1245.94010].


MSC:

94A62 Authentication, digital signatures and secret sharing