Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures

نویسندگان

  • Chae Hoon Lim
  • Pil Joong Lee
چکیده

Discrete log based identiication and signature schemes are well-suited to identity proof and signature generation, but not suitable for veriication, by smart cards, due to their highly asymmetric computational load between the prover/signer and the veriier. In this paper, we present very eecient and practical protocols for fast veriication in these schemes, where the veriier with limited computing power performs its computation fast with the aid of the powerful prover/signer. The proposed protocols require very small amounts of computation and communication. The prover/signer only needs to perform a few modular exponentiations in real-time and the two interacting parties only need to communicate a few long numbers. Using the proposed prover-aided veriication (PAV) protocol, the veriier can perform the Schnorr-like identiication scheme almost as fast as the Guillou-Quisquater scheme. We generalize the PAV protocol into the signer-aided veriication (SAV) protocol, which can be used for veriication of any public function.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability

Group signatures are an important privacy-enhancing tool that allow to anonymously sign messages on behalf of a group. A recent feature for group signatures is controllable linkability, where a dedicated linking authority (LA) can determine whether two given signatures stem from the same signer without being able to identify the signer(s). Currently the linking authority is fully trusted, which...

متن کامل

A note on an identity-based ring signature scheme with signer verifiability

Recently, Herranz presented an identity-based ring signature scheme featuring signer verifiability where a signer can prove that he or she is the real signer by releasing an authorship proof. In this paper we show that this scheme is vulnerable to a key recovery attack in which a user’s secret signing key can be efficiently recovered through the use of two known ring signatures and their corres...

متن کامل

Remote Data Auditing Scheme in Secured Cloud Storage Environment

Cloud data centers are used to maintain the shared data values for the data owners .Data owners and public verifiers are involved to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and block signatures are used in the integrity verification process. Public data auditing schemes are tuned to verify the encrypted cloud storage environment. “On...

متن کامل

Identity Based Strong Designated Verifier Parallel Multi-Proxy Signature Scheme

This paper presents a new identity based strong designated verifier parallel multiproxy signature scheme. Multi-Proxy signatures allow the original signer to delegate his signing power to a group of proxy signers. In our scheme, the designated verifier can only validate proxy signatures created by a group of proxy signer.

متن کامل

Short Convertible Undeniable Signature From Pairing

Undeniable signatures, introduced by Chaum and van Antwerpen, require a verifier to interact with the signer to verify a signature, and hence allow the signer to control the verifiability of his signatures. Convertible undeniable signatures allow the signer to convert undeniable signatures into ordinary signatures. In this paper we propose some extended variants of the famous DiffieHellman assu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995