2019
DOI: 10.1007/s10207-019-00430-5
|View full text |Cite
|
Sign up to set email alerts
|

Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…The results of the comparison are in the Table 2 and Figure 1 to 5. 2) Our concrete scheme satisfies the requirements of unforgeability in [28] as we demonstrated our security proofs in Section IV-A. 3) Our concrete scheme provides a signer privacy preservation in the aspect of deniability; hence, none other than designated verifier can verify the validity of the signature.…”
Section: B Our Contributionsmentioning
confidence: 86%
See 1 more Smart Citation
“…The results of the comparison are in the Table 2 and Figure 1 to 5. 2) Our concrete scheme satisfies the requirements of unforgeability in [28] as we demonstrated our security proofs in Section IV-A. 3) Our concrete scheme provides a signer privacy preservation in the aspect of deniability; hence, none other than designated verifier can verify the validity of the signature.…”
Section: B Our Contributionsmentioning
confidence: 86%
“…Huang et al was first introduced the notion of certificateless designated verifier signature schemes in [18]. Recently, many certificateless designated verifier signature schemes were proposed [13], [22], [28], [31]. Rastegari et al [28] provided intensive security reviews on certificateless designated verifier signature schemes and they gave a conclusion on the suitable security model for certificateless designated verifier signature schemes.…”
Section: A Related Workmentioning
confidence: 99%
“…Rastegari, Susilo, and Dakhilalian [10] proposed the Certificateless public key cryptography (CL-PKC) as a means to overcome the problems of PKI and ID-based settings. "In conventional PKI, CAs are assumed to be fully trusted.…”
Section: Literature Review and Related Workmentioning
confidence: 99%
“…According to [10], "PKI architectures can be implemented in the following ways: Single CA architecture, Enterprise PKI architecture and Hybrid PKI architecture". However, [18], suggest that the general construction of a PKI is denoted as non-hierarchical, hierarchical, or cross-certified.…”
Section: Pki Architecture and Trust Modelsmentioning
confidence: 99%
“…In 2019, Rastegari et al [16] further combined DVS with certificates cryptosystems and achieved a substantial system that was proved to be secure using the standard model. At present, many scholars have paid attention to the development of SDVS systems [17,18,19,20,21,22,23].…”
Section: Introductionmentioning
confidence: 99%