Affiliation:
1. School of Mathematics and Statistics, Fujian Normal University, Fuzhou 350117, China
2. Key Laboratory of Analytical Mathematics and Applications, Fujian Normal University, Ministry of Education, Fuzhou 350117, China
Abstract
A transitive signature scheme enables anyone to obtain the signature on edge (i,k) by combining the signatures on edges (i,j) and (j,k), but it suffers from signature theft and signature abuse. The existing work has solved these problems using a universal designated verifier transitive signature (UDVTS). However, the UDVTS scheme only enables the designated verifier to authenticate signatures, which provides a simple way for the signer to deny having signed some messages. The fact that the UDVTS is not publicly verifiable prevents the verifier from seeking help arbitrating the source of signatures. Based on this problem, this paper proposes a traceable universal designated verifier transitive signature (TUDVTS) and its security model. We introduce a tracer into the system who will trace the signature back to its true source after the verifier has submitted an application for arbitration. To show the feasibility of our primitive, we construct a concrete scheme from a bilinear group pair (G,GT) of prime order and prove that the scheme satisfies unforgeability, privacy, and traceability.
Funder
National Natural Science Foundation of China
Natural Science Foundation of Fujian Province, China
Reference30 articles.
1. Preneel, B. (2002). Topics in Cryptology—CT-RSA 2002, Springer.
2. Universal Designated Verifier Transitive Signatures for Graph-Based Big Data;Hou;Inf. Sci.,2015
3. Zheng, Y. (2002). Advances in Cryptology—ASIACRYPT 2002, Springer.
4. Transitive Signatures: New Schemes and Proofs;Bellare;IEEE Trans. Inf. Theory,2005
5. Wang, L., Cao, Z., Zheng, S., Huang, X., and Yang, Y. (2007). Progress in Cryptology—INDOCRYPT 2007, Springer. INDOCRYPT’07.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献