{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:45:54Z","timestamp":1709826354589},"reference-count":25,"publisher":"Wiley","issue":"8","license":[{"start":{"date-parts":[[2013,7,5]],"date-time":"2013-07-05T00:00:00Z","timestamp":1372982400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2014,6,10]]},"abstract":"<jats:title>SUMMARY<\/jats:title><jats:p>Designated verifier signatures (DVS) allow a signer to create a signature whose validity can only be verified by a specific entity chosen by the signer. In addition, the chosen entity, known as the designated verifier, cannot convince any body that the signature is created by the signer. Multidesignated verifiers signatures (MDVS) are a natural extension of DVS in which the signer can choose multiple designated verifiers. DVS and MDVS are useful primitives in electronic voting and contract signing. In this paper, we investigate various aspects of MDVS and make two contributions. Firstly, we revisit the notion of unforgeability under rogue key attack on MDVS. In this attack scenario, a malicious designated verifier tries to forge a signature that passes through the verification of another honest designated verifier. A common counter\u2010measure involves making the knowledge of secret key assumption in which an adversary is required to produce a proof\u2010of\u2010knowledge of the secret key. We strengthened the existing security model to capture this attack and propose a new construction that does not rely on the knowledge of secret key assumption. Secondly, we propose a generic construction of strong MDVS. Copyright \u00a9 2013 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/cpe.3094","type":"journal-article","created":{"date-parts":[[2013,7,5]],"date-time":"2013-07-05T13:24:50Z","timestamp":1373030690000},"page":"1574-1592","source":"Crossref","is-referenced-by-count":6,"title":["(Strong) multidesignated verifiers signatures secure against rogue key attack"],"prefix":"10.1002","volume":"26","author":[{"given":"Man Ho","family":"Au","sequence":"first","affiliation":[{"name":"Centre for Computer and Information Security Research (CCISR), School of Computer Science and Software Engineering University of Wollongong  NSW 2522 Australia"}]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[{"name":"Centre for Computer and Information Security Research (CCISR), School of Computer Science and Software Engineering University of Wollongong  NSW 2522 Australia"}]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[{"name":"Centre for Computer and Information Security Research (CCISR), School of Computer Science and Software Engineering University of Wollongong  NSW 2522 Australia"}]},{"given":"Yunmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Centre for Computer and Information Security Research (CCISR), School of Computer Science and Software Engineering University of Wollongong  NSW 2522 Australia"}]}],"member":"311","published-online":{"date-parts":[[2013,7,5]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_13"},{"key":"e_1_2_9_3_1","unstructured":"ChaumD.Private signature and proof systems 1996. US Patent 5 493 614."},{"key":"e_1_2_9_4_1","series-title":"Lecture Notes in Computer Science","first-page":"40","volume-title":"ICISC","author":"Saeednia S","year":"2003"},{"key":"e_1_2_9_5_1","article-title":"Verifier\u2010designated signatures","author":"Desmedt Y","year":"2003","journal-title":"CRYPTO Rump Session"},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30191-2_38"},{"key":"e_1_2_9_7_1","first-page":"305","volume-title":"ICPADS (2)","author":"Ng CY","year":"2005"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2006.86"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11774716_23"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2006.08.015"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73549-6_116"},{"issue":"3","key":"e_1_2_9_12_1","first-page":"348","article-title":"Multi\u2010designated verifiers signatures revisited","volume":"7","author":"Chow SSM","year":"2008","journal-title":"International Journal of Network Security"},{"key":"e_1_2_9_13_1","article-title":"New extensions of pairing\u2010based signatures into universal (multi) designated verifier signatures","volume":"0802","author":"Vergnaud D","year":"2008","journal-title":"CoRR"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2011.03.002"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2011.31"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2012.045694"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2007.11.021"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180453"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39927-8_28"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0146-1"},{"key":"e_1_2_9_21_1","series-title":"Lecture Notes in Computer Science","first-page":"105","volume-title":"SCN","author":"Laguillaumie F","year":"2004"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054130"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052252"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_8"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_1"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.3094","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.3094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T13:11:16Z","timestamp":1694437876000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.3094"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,5]]},"references-count":25,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2014,6,10]]}},"alternative-id":["10.1002\/cpe.3094"],"URL":"https:\/\/doi.org\/10.1002\/cpe.3094","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,5]]}}}