Adaptively Secure Strong Designated Signature

  • Neetu Sharma
  • Rajeev Anand Sahu
  • Vishal SaraswatEmail author
  • Birendra Kumar Sharma
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10095)


Almost all the available strong designated verifier signature (SDVS) schemes are either insecure or inefficient for practical implementation. Hence, an efficient and secure SDVS algorithm is desired. In this paper, we propose an efficient strong designated verifier signature on identity-based setting, we call it ID-SDVS scheme. The proposed scheme is strong existentially unforgeable against adaptive chosen message and adaptive chosen identity attack under standard assumptions, the hardness of the decisional and computational Bilinear Diffie-Hellman Problem (BDHP). Though the unverifiability by a non-designated verifier and the strongness are essential security properties of a SDVS, the proofs for these properties are not provided in most of the literature on SDVS we reviewed. We provide the proofs of unverifiability and of strongness of the proposed scheme. Moreover, we show that the proposed scheme is significantly more efficient in the view of computation and operation time than the existing similar schemes.


Strong designated verifier signature Identity-based cryptography Bilinear Diffie-Hellman problem Provable security 


  1. 1.
    Cao, X., Kou, W., Xiaoni, D.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Chaum, D.: Zero-knowledge undeniable signatures (extended abstract). In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 458–464. Springer, Heidelberg (1991). doi: 10.1007/3-540-46877-3_41 Google Scholar
  3. 3.
    Chaum, D., Antwerpen, H.: Undeniable signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, Heidelberg (1990). doi: 10.1007/0-387-34805-0_20 CrossRefGoogle Scholar
  4. 4.
    Debiao, H., Jianhua, C., Jin, H.: An identity-based proxy signature schemes without bilinear pairings. Ann. Telecommun. 66(11–12), 657–662 (2011)CrossRefGoogle Scholar
  5. 5.
    Du, H., Wen, Q.: Attack on Kang et al.’s identity-based strong designated verifier signature scheme. IACR Cryptology ePrint Archive, 2008:297 (2008)Google Scholar
  6. 6.
    Huang, X., Susilo, W., Mu, Y., Zhang, F.: Short (identity-based) strong designated verifier signature schemes. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol. 3903, pp. 214–225. Springer, Heidelberg (2006). doi: 10.1007/11689522_20 CrossRefGoogle Scholar
  7. 7.
    Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996). doi: 10.1007/3-540-68339-9_13 Google Scholar
  8. 8.
    Kancharla, P.K., Gummadidala, S., Saxena, A.: Identity based strong designated verifier signature scheme. Informatica 18(2), 239–252 (2007)MathSciNetzbMATHGoogle Scholar
  9. 9.
    Kang, B., Boyd, C., Dawson, E.: Identity-based strong designated verifier signature schemes: attacks and new construction. Comput. Electr. Eng. 35(1), 49–53 (2009)CrossRefzbMATHGoogle Scholar
  10. 10.
    Kang, B., Boyd, C., Dawson, E.D.: A novel identity-based strong designated verifier signature scheme. J. Syst. Softw. 82(2), 270–273 (2009)CrossRefGoogle Scholar
  11. 11.
    Lee, J.-S., Chang, J.H., Lee, D.H.: Forgery attacks on Kang et al.’s identity-based strong designated verifier signature scheme and its improvement with security proof. Comput. Electr. Eng. 36(5), 948–954 (2010)CrossRefzbMATHGoogle Scholar
  12. 12.
    MIRACL. Multiprecision integer and rational arithmetic cryptographic library.
  13. 13.
    Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)CrossRefzbMATHGoogle Scholar
  14. 14.
    Saeednia, S., Kremer, S., Markowitch, O.: An efficient strong designated verifier signature scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004). doi: 10.1007/978-3-540-24691-6_4 CrossRefGoogle Scholar
  15. 15.
    Susilo, W., Zhang, F., Mu, Y.: Identity-based strong designated verifier signature schemes. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 313–324. Springer, Heidelberg (2004). doi: 10.1007/978-3-540-27800-9_27 CrossRefGoogle Scholar
  16. 16.
    Zhang, J., Mao, J.: A novel ID-based designated verifier signature scheme. Inf. Sci. 178(3), 766–773 (2008)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  • Neetu Sharma
    • 1
  • Rajeev Anand Sahu
    • 2
  • Vishal Saraswat
    • 2
    Email author
  • Birendra Kumar Sharma
    • 1
  1. 1.PRS UniversityRaipurIndia
  2. 2.CRRao AIMSCSHyderabadIndia

Personalised recommendations