Articles with "designated verifier" as a keyword



Identity-Based Quantum Designated Verifier Signature

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-019-04377-0

Abstract: Designated verifier signatures are very useful in the applications such as e-voting and auction. In this paper, an identity-based quantum designated verifier signature (IDQDVS) scheme is proposed. It has the security properties such as designated… read more here.

Keywords: designated verifier; identity based; signature; verifier signature ... See more keywords

A scheme on converting quantum signature with public verifiability into quantum designated verifier signature

Sign Up to like & get
recommendations!
Published in 2018 at "Optik"

DOI: 10.1016/j.ijleo.2018.03.048

Abstract: Abstract To solve the conflict of certification and privacy such as the electronic election, online bidding and other such network applications, a quantum signature scheme with public verifiability is converted into a designated verifier signature… read more here.

Keywords: signature scheme; designated verifier; signature; verifier signature ... See more keywords

Quantum designated verifier multi- signature scheme without arbitrator

Sign Up to like & get
recommendations!
Published in 2025 at "Physica Scripta"

DOI: 10.1088/1402-4896/addf89

Abstract: We propose a quantum designated verifier multi- signature (QDVMS) scheme. In this scheme, multiple users can generate a valid signature by simultaneously signing the original message, and the designated verifier holds the exclusive capability to… read more here.

Keywords: scheme; verifier multi; quantum designated; signature ... See more keywords

A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2809437

Abstract: Certificateless public key cryptography is a commonly adopted implementation system to solve problems of key-escrow and untrusted authority. Certificateless strong designated verifier signatures (CL-SDVSs) are special variations of digital signatures, since their authenticity can only… read more here.

Keywords: ssa kca; certificateless strong; non delegatable; strong designated ... See more keywords

An Efficient Strong Designated Verifier Signature Based on $\mathcal{R}-$ SIS Assumption

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2018.2889242

Abstract: The designated verifier signature (DVS), introduced by Jakobsson et al., has the property that only the designated verifier can verify the generated signature. In order to prevent an eavesdropper to get the signature on-line before… read more here.

Keywords: signature; designated verifier; inline formula; tex math ... See more keywords

A Certificateless Verifiable Strong Designated Verifier Signature Scheme

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2938898

Abstract: Certificateless strong designated verifier signature schemes have realized the merit of CL-PKC against the traditional strong designated verifier signatures. However, when the signer and the designated verifier disagree with the signature, existing schemes cannot distinguish… read more here.

Keywords: strong designated; designated verifier; scheme; verifier signature ... See more keywords

Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3355196

Abstract: Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated… read more here.

Keywords: scheme; signature; cryptography; designated verifier ... See more keywords

An Efficient Aggregate Signature Scheme With Designated Verifier Based on the Schnorr Signature in Healthcare Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2024.3432757

Abstract: In healthcare wireless sensor networks (HWSNs), a lot of personal medical data are collected by wireless sensors. Given that a medical diagnostic analysis heavily relies on these medical data, any tampering with medical data may… read more here.

Keywords: scheme; signature scheme; medical data; signature ... See more keywords

Strong Designated Verifier Signature Scheme with Undeniability and Strong Unforgeability in the Standard Model

Sign Up to like & get
recommendations!
Published in 2019 at "Applied Sciences"

DOI: 10.3390/app9102062

Abstract: Strong designated verifier signature can provide an efficient way to protect the identity privacy of the signer and the integrity of the data transmitted over the public channel. These characteristics make it very useful in… read more here.

Keywords: strong designated; designated verifier; scheme; verifier signature ... See more keywords

Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing

Sign Up to like & get
recommendations!
Published in 2025 at "Entropy"

DOI: 10.3390/e27070753

Abstract: Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification. Public… read more here.

Keywords: data possession; identity based; verification; designated verifier ... See more keywords

Efficient Identity-Based Universal Designated Verifier Signature Proof Systems

Sign Up to like & get
recommendations!
Published in 2025 at "Mathematics"

DOI: 10.3390/math13050743

Abstract: The implementation of universal designated verifier signatures proofs (UDVSPs) enhances data privacy and security in various digital communication systems. However, practical applications of UDVSP face challenges such as high computational overhead, onerous certificate management, and… read more here.

Keywords: identity based; signature; universal designated; designated verifier ... See more keywords