Advertisement

Efficient strong designated verifier signature schemes without random oracle or with non-delegatability

  • Qiong HuangEmail author
  • Guomin Yang
  • Duncan S. Wong
  • Willy Susilo
Regular Contribution

Abstract

Designated verifier signature (DVS) allows a signer to convince a designated verifier that a signature is generated by the signer without letting the verifier transfer the conviction to others, while the public can still tell that the signature must be generated by one of them. Strong DVS (SDVS) strengthens the latter part by restricting the public from telling whether the signature is generated by one of them or by someone else. In this paper, we propose two new SDVS schemes. Compared with existing SDVS schemes, the first new scheme has almost the same signature size and meanwhile, is proven secure in the standard model, while the existing ones are secure in the random oracle model. It has tight security reduction to the DDH assumption and the security of the underlying pseudorandom functions. Our second new scheme is the first SDVS supporting non-delegatability, the notion of which was introduced by Lipmaa, Wang and Bao in the context of DVS in ICALP 2005. The scheme is efficient and is provably secure in the random oracle model based on the discrete logarithm assumption and Gap Diffie–Hellman assumption.

Keywords

Strong designated verifier signature Non-delegatability Non-transferability Standard model Signature scheme 

References

  1. 1.
    Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: CT-RSA, vol. 2020 of Lecture Notes in Computer Science, pp. 143–158. Springer (2001)Google Scholar
  2. 2.
    Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Proceedings of Advances in Cryptology—CRYPTO 1992, vol. 740 of Lecture Notes in Computer Science, pp. 390–420. Springer (1992)Google Scholar
  3. 3.
    Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Proceedings of Advances in Cryptology—ASIACRYPT 2000, vol. 1976 of Lecture Notes in Computer Science, pp. 531–545. Springer (2000)Google Scholar
  4. 4.
    Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73. ACM (1993)Google Scholar
  5. 5.
    Bhaskar R., Herranz J., Laguillaumie F.: Aggregate designated verifier signatures and application to secure routing. Int. J. Secur. Netw. 2(3/4), 192–201 (2007)CrossRefGoogle Scholar
  6. 6.
    Boneh, D., Boyen, X.: Short signatures without random oracles. In: Proceedings of Advances in Cryptology—EUROCRYPT 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 56–73. Springer (2004a)Google Scholar
  7. 7.
    Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Proceedings of Advances in Cryptology—CRYPTO 2004, vol. 3152 of Lecture Notes in Computer Science, pp. 41–55. Springer (2004b)Google Scholar
  8. 8.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17(4), 297–319 (2004) A preliminary version appeared in Asiacrypt (2001)Google Scholar
  9. 9.
    Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Proceedings of Advances in Cryptology—CRYPTO 1989, vol. 435 of Lecture Notes in Computer Science, pp. 212–216. Springer (1989)Google Scholar
  10. 10.
    Gentry, C., Silverberg, A.: Hierarchical id-based cryptography. In: Proceedings of Advances in Cryptology—ASIACRYPT 2002, vol. 2501 of Lecture Notes in Computer Science, pp. 548–566. Springer (2002)Google Scholar
  11. 11.
    Huang, Q., Susilo, W., Wong, D.S. (2009) Non-delegatable identity-based designated verifier signature. Cryptology ePrint Archive, Report 2009/367Google Scholar
  12. 12.
    Huang, X., Mu, Y., Susilo, W., Wu, W.: Provably secure pairing-based convertible undeniable signature with short signature length. In: Proceedings of 1st International Conference on Pairing-Based Cryptography, Pairing 2007, vol. 4575 of Lecture Notes in Computer Science, pp. 367–391. Springer (2007)Google Scholar
  13. 13.
    Huang, X., Susilo, W., Mu, Y., Wu, W.: Universal designated verifier signature without delegatability. In: Proceedings of 8th International Conference on Information and Communications Security, ICICS 2006, vol. 4307 of Lecture Notes in Computer Science, pp. 479–498. Springer (2006)Google Scholar
  14. 14.
    Huang X., Susilo W., Mu Y., Wu W.: Secure universal designated verifier signature without random oracles. Int. J. Inf. Secur. 7(3), 171–183 (2007)CrossRefGoogle Scholar
  15. 15.
    Huang X., Susilo W., Mu Y., Zhang F.: Short designated verifier signature scheme and its identity-based variant. Int. J. Netw. Secur. 6(1), 82–93 (2008)Google Scholar
  16. 16.
    Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Proceedings of Advances in Cryptology—EUROCRYPT 1996, vol. 1070 of Lecture Notes in Computer Science, pp. 143 – 154. Springer (1996)Google Scholar
  17. 17.
    Katz, J., Wang, N.: Efficiency improvements for signature schemes with tight security reductions. In: ACM Conference on Computer and Communications Security, pp. 155–164. ACM (2003)Google Scholar
  18. 18.
    Laguillaumie, F., Libert, B., Quisquater, J.-J.: Universal designated verifier signatures without random oracles or non-black box assumptions. In: Proceedings of 5th International Conference on Security and Cryptography for Networks, SCN 2006, vol. 4116 of Lecture Notes in Computer Science, pp. 63–77. Springer (2006)Google Scholar
  19. 19.
    Laguillaumie, F., Vergnaud, D.: Designated verifier signatures: anonymity and efficient construction from any bilinear map. In: Proceedings of 4th International Conference on Security in Communication Networks, SCN 2004, vol. 3352 of Lecture Notes in Computer Science, pp. 105–119. Springer (2004a)Google Scholar
  20. 20.
    Laguillaumie, F., Vergnaud, D.: Multi-designated verifiers signatures. In: Proceedings of 6th International Conference on Information and Communications Security, ICICS 2004, vol. 3269 of Lecture Notes in Computer Science, pp. 495–507. Springer (2004b)Google Scholar
  21. 21.
    Li, Y., Lipmaa, H., Pei, D.: On delegatability of four designated verifier signatures. In: Proceedings of 7th International Conference on Information and Communications Security, ICICS 2005, vol.e 3783 of Lecture Notes in Computer Science, pp. 61–71. Springer (2005)Google Scholar
  22. 22.
    Lipmaa, H., Wang, G., Bao, F.: Designated verifier signature schemes: Attacks, new security notions and a new construction. In: Proceedings of 32th International Colloquium on Automata, Languages and Programming, ICALP 2005, vol. 3580 of Lecture Notes in Computer Science, pp. 459–471. Springer (2005)Google Scholar
  23. 23.
    Naor M., Reingold O.: Number-theoretic constructions of efficient pseudo-random functions. J. ACM 51(2), 231–262 (2004)MathSciNetCrossRefGoogle Scholar
  24. 24.
    Pointcheval D., Stern J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)zbMATHCrossRefGoogle Scholar
  25. 25.
    Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd C. (ed.) Proceedings of Advances in Cryptology—ASIACRYPT 2001, vol. 2248 of Lecture Notes in Computer Science, pp. 552–565. Springer (2001)Google Scholar
  26. 26.
    Saeednia, S., Kremer, S., Markowitch, O.: An efficient strong designated verifier signature scheme. In: Proceedings of 6th International Conference on Information Security and Cryptology, ICISC 2003, vol. 2971 of Lecture Notes in Computer Science, pp. 40–54. Springer (2003)Google Scholar
  27. 27.
    Shacham, H., Waters, B.: Efficient ring signatures without random oracles. In: Okamoto, T., Wang, X. (eds.) Proceedings of Public Key Cryptography 2007, vol. 4450 of Lecture Notes in Computer Science, pp. 166–180. Springer (2007)Google Scholar
  28. 28.
    Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J.: Universal designated-verifier signatures. In: Proceedings of Advances in Cryptology—ASIACRYPT 2003 vol. 2894 of Lecture Notes in Computer Science, pp. 523–542. Springer (2003)Google Scholar
  29. 29.
    Steinfeld, R., Wang, H., Pieprzyk, J.: Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. In: Proceedings of Public Key Cryptography 2004, vol. 2947 of Lecture Notes in Computer Science, pp. 86–100. Springer (2004)Google Scholar
  30. 30.
    Susilo, W., Zhang, F., Mu, Y.: Identity-based strong designated verifier signature schemes. In: Proceedings of 9th Australasian Conference on Information Security and Privacy, ACISP 2004, vol. 3108 of Lecture Notes in Computer Science, pp. 313–324. Springer (2004)Google Scholar
  31. 31.
    Vergnaud, D.: New extensions of pairing-based signatures into universal designated verifier signatures. In: Proceedings of 33th International Colloquium on Automata, Languages and Programming, ICALP 2006, vol. 4052 of Lecture Notes in Computer Science, pp. 58–69. Springer (2006)Google Scholar
  32. 32.
    Wang B., Song Z.: A non-interactive deniable authentication scheme based on designated verifier proofs. Inf. Sci. 179(6), 858–865 (2009)MathSciNetzbMATHCrossRefGoogle Scholar
  33. 33.
    Zhang, R., Furukawa, J., Imai, H.: Short signature and universal designated verifier signature without random oracles. In: Proceedings of 3rd International Conference on Applied Cryptography and Network Security, ACNS 2005, vol. 3531 of Lecture Notes in Computer Science, pp. 483–498. Springer (2005)Google Scholar

Copyright information

© Springer-Verlag 2011

Authors and Affiliations

  • Qiong Huang
    • 1
    • 2
    Email author
  • Guomin Yang
    • 3
  • Duncan S. Wong
    • 2
  • Willy Susilo
    • 4
  1. 1.Department of Computer Science and EngineeringSouth China Agricultural UniversityGuangzhouChina
  2. 2.Department of Computer ScienceCity University of Hong KongHong KongChina
  3. 3.Temasek LaboratoriesNational University of SingaporeSingaporeSingapore
  4. 4.School of Computer Science and Software EngineeringUniversity of WollongongWollongongAustralia

Personalised recommendations