Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

Preprint English OPEN
Lal, Sunder ; Verma, Vandani (2009)
  • Subject: Computer Science - Cryptography and Security

Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Des... View more
  • References (8)

    17. H.Mala, M.D.Alian, M.Brenjkoub. A new identity-based proxy signature scheme from bilinear pairings. IEEE 2006, 3304-3308.

    18. M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures for delegating signing operation, revisited, In Proc. Of 3rd ACM conference on computer and communication security (CCS), 1996, 48-57.

    19. S.Saeednia, S.Kreme, O.Markotwich. An efficient strong designated verifier signature scheme. ICICS 2003, LNCS #2971, Springer-Verlag, 2003, 40-54.

    20. K.Shum, V.K.Wei. A strong proxy signature scheme with proxy signer privacy protection. Technologies: Infrastructure for Collaborative Enterprises 2002.

    21. Tony Thomas, Arbind Kumar Lal. Group Signature Scheme Using Braid Groups arXiv:cs.CR/0602063 v1, 2006.

    22. G. K. Verma. Blind signature schemes over Braid groups, 2008, available at http://eprint.iacr.org/2008/027.

    23. J.Xu, Z.Zhang, D.Feng. ID-based proxy signature using bilinear pairings. Cryptology eprint Archive. Report 2004/206. Available at http://eprint.iacr.org/2004/206.

    24. G. Wang. Designated verifier proxy signature for e-commerce. IEEE International Conferences on Multimedia and Expo (ICME 2004) CD-ROM, ISBN- 0-7803-8604- 3, Taipei, Taiwan, 2004, 27-30.

  • Metrics
    No metrics available
Share - Bookmark