Skip to main content

Non-delegatable Strong Designated Verifier Signature on Elliptic Curves

  • Conference paper
Book cover Information Security and Cryptology - ICISC 2011 (ICISC 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7259))

Included in the following conference series:

Abstract

We propose a non-delegatable strong designated verifier signature on elliptic curves. The size of the signature is less than 500 bits considering an 80 bits security strength. It provably satisfies the non-delegatability and signer ambiguity properties. The construction method is a combination of the Schnorr signature and the elliptic curve Diffie-Hellman problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. Bellare, M., Neven, G.: Multi-Signatures in the Plain Public-Key Model and a General Forking Lemma. In: Proceedings of the 13th Association for Computing Machinery (ACM) Conference on Computer and Communications Security (CCS), pp. 390–399. ACM, Alexandria (2006)

    Google Scholar 

  3. Dent, A.W., Galbraith, S.D.: Hidden Pairings and Trapdoor DDH Groups. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076, pp. 436–451. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Huang, X., Susilo, W., Mu, Y., Wu, W.: Universal Designated Verifier Signature Without Delegatability. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 479–498. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Huang, X., Susilo, W., Mu, Y., Zhang, F.: Short Designated Verifier Signature Scheme and Its Identity-based Variant. International Journal of Network Security 6(1), 82–93 (2008)

    Google Scholar 

  6. Huang, Q., Susil, W., Wong, D.S.: Non-delegatable Identity-based Designated Verifier Signature. Cryptology ePrint Archive: Report 2009/367 (2009)

    Google Scholar 

  7. Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability. Cryptology ePrint Archive: Report 2009/518 (2009)

    Google Scholar 

  8. Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Identity-based strong designated verifier signature revisited. Journal of Systems and Software 84(1), 120–129 (2011)

    Article  Google Scholar 

  9. Damgård, I.B.: Towards Practical Public Key Systems Secure against Chosen Ciphertext Attacks. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 445–456. Springer, Heidelberg (1992)

    Google Scholar 

  10. Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and Their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)

    Google Scholar 

  11. Kancharla, P.K., Gummadidala, S., Saxena, A.: Identity Based Strong Designated Verifier Signature Scheme. Journal of Informatica 18(2), 239–252 (2007)

    MathSciNet  MATH  Google Scholar 

  12. Katz, J., Wang, N.: Efficiency Improvements for Signature Schemes with Tight Security Reductions. In: 10th ACM Conference on Computer and Communications Security, pp. 155–164. ACM Press (2003)

    Google Scholar 

  13. Laguillaumie, F., Vergnaud, D.: Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 105–119. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Lee, J., Chang, J.: Comment on Saeednia et al.’s strong designated verifier signature scheme. Journal of Computer Standards & Interfaces - CSI 31(1), 258–260 (2009)

    Article  Google Scholar 

  15. Li, Y., Susilo, W., Mu, Y., Pei, D.: Designated Verifier Signature: Definition, Framework and New Constructions. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 1191–1200. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  16. Liao, Y., Jia, C.: Designated verifier signature without random oracles. Communications, Circuits and Systems. In: IEEE International Conference on ICCCAS 2008, pp. 474–477 (2008)

    Google Scholar 

  17. Lipmaa, H., Wang, G., Bao, F.: Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 459–471. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  18. Mao, W.: Modern cryptography: theory and practice. Prentice Hall Professional Technical Reference (2003)

    Google Scholar 

  19. Shahandashti, S.F., Safavi-Naini, R.: Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 121–140. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  20. Saeednia, S., Kramer, S., Markovitch, O.: An Efficient Strong Designated Verifier Signature Scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Sun, X., Li, J., Hu, Y., Chen, G.: Delegatability of an Identity Based Strong Designated Verifier Signature Scheme. INFORMATICA 21(1), 117–122 (2010)

    MathSciNet  MATH  Google Scholar 

  22. Tso, R., Okamoto, T., Okamoto, E.: Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 113–127. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  23. Wang, B.: A non-delegatable identity-based strong designated verifier signature scheme, http://eprint.iacr.org/2008/507

  24. Zhang, J., Mao, J.: A novel ID-based designated verifier signature scheme. Information Sciences 178(3), 766–773 (2008)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tian, H., Chen, X., Jiang, Z., Du, Y. (2012). Non-delegatable Strong Designated Verifier Signature on Elliptic Curves. In: Kim, H. (eds) Information Security and Cryptology - ICISC 2011. ICISC 2011. Lecture Notes in Computer Science, vol 7259. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31912-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31912-9_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31911-2

  • Online ISBN: 978-3-642-31912-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics