Short and efficient identity-based undeniable signature scheme

N/ACitations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The first provably secure identity-based undeniable signature schemes was proposed by Libert and Quisquater, where they formulated the security model of undeniable signature schemes in an identity-based setting for the first time. Later, Wu et al. proposed a convertible identity-based undeniable signature scheme. Both of the proposed schemes require pairing evaluations in their signing algorithm. In this paper, we propose an efficient identity-based undeniable signature scheme and prove its security in the random oracle model. Due to its efficient signing algorithm and short signature length, our scheme can be applied to systems with low-computation power which are operating in low-bandwidth communication channels (e.g. mobile phones, PDAs, etc.). © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Behnia, R., Heng, S. H., & Gan, C. S. (2012). Short and efficient identity-based undeniable signature scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7449 LNCS, pp. 143–148). https://doi.org/10.1007/978-3-642-32287-7_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free