Advertisement

A Tight Security Reduction Designated Verifier Proxy Signature Scheme Without Random Oracle

  • Xiaoming HuEmail author
  • Hong Lu
  • Yan Liu
  • Jian Wang
  • Wenan Tan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9155)

Abstract

Most of existing designated verifier proxy signature (DVPSt) schemes which are proved to be secure in the standard model is constructed based on Water’s identity-based encryption. Therefore, security reduction efficiency of these schemes is very low and it may decrease these schemes’ security. In this study, we propose a new DVPSt scheme and present a detailed security proof of the proposed DVPSt in the standard model. We also address a tight security reduction of the proposed scheme based on the gap bilinear Diffie-Hellman assumption. Compared with other DVPSt schemes, our proposed DVPSt has two advantages, i.e., the computational cost is lower and security reduction is tighter. Therefore, our proposed DVPSt scheme is very suitable for application in some communication network situations in where the resources are limited.

Keywords

Information security Communication network Designated verifier proxy signature Standard model Gap bilinear Diffie-Hellman 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mambo, M., Usuda, K., Okmamoto, E.: Proxy signatures for delegation signing operation. In: Proc. 1996 ACM CCS conf., pp. 48–57. ACM Press, New York (1996)Google Scholar
  2. 2.
    Shao, Z.: Proxy Signature Schemes based on Factoring. Information Processing Letter 85(3), 137–143 (2003)zbMATHCrossRefGoogle Scholar
  3. 3.
    Huang, X., Susilo, W., Mu, Y., Wu, W.: Proxy signature without random oracles. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 473–484. Springer, Heidelberg (2006) CrossRefGoogle Scholar
  4. 4.
    Zhou, Y., Cao, Z.-F., Chai, Z.: An efficient proxy-protected signature scheme based on factoring. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) ISPA-WS 2005. LNCS, vol. 3759, pp. 332–341. Springer, Heidelberg (2005) CrossRefGoogle Scholar
  5. 5.
    Schuldt, J.C.N., Matsuura, K., Paterson, K.G.: Proxy signatures secure against proxy key exposure. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 141–161. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  6. 6.
    Sun, Y., Xu, C., Yu, Y., Mu, Y.: Strongly Unforgeable Proxy Signature Scheme Secure in The Standard Model. Journal of Systems and Software 84(9), 1471–1479 (2011)CrossRefGoogle Scholar
  7. 7.
    Zhang, J., Mao, J.: Another Efficient Proxy Signature Scheme in The Standard Model. Journal of Information Science and Engineering 27, 1249–1264 (2011)zbMATHMathSciNetGoogle Scholar
  8. 8.
    Zhang, J., Liu, C., Yang, Y.: An Efficient Secure Proxy Verifiably Encrypted Signature Scheme. Journal Network and Computer Applications 33, 29–34 (2010)CrossRefGoogle Scholar
  9. 9.
    Boldyreva, A., Palacio, A., Warinschi, B.: Secure Proxy Signature Schemes for Delegation of Signing Rights. Journal of Cryptology 25, 57–115 (2012)zbMATHMathSciNetCrossRefGoogle Scholar
  10. 10.
    Bao, H., Cao, Z.: Group-proxy Signature Scheme: a Novel Solution to Electronic Cash. Journal of Intelligent Systems 22(2), 95–110 (2013)CrossRefGoogle Scholar
  11. 11.
    Dai, J., Yang, X., Dong, J.: Designated-receiver proxy signature scheme for electronic commerce. In: Proc. 2003 SMC conf., pp. 384–389. IEEE Press, New York (2003)Google Scholar
  12. 12.
    Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996) CrossRefGoogle Scholar
  13. 13.
    Wang, G.: Designated-verifier proxy signatures for e-commerce. In: Proc. 2004 ICME conf., pp. 1731–1734. IEEE Press, New York (2004)Google Scholar
  14. 14.
    Lu, R., Cao, Z., Dong, X.: Designated verifier proxy signature scheme from bilinear pairings. In: Proc. 2006 ACMCCS conf., 2006, pp. 40–47. IEEE Press, New York (2006)Google Scholar
  15. 15.
    Yu, Y., Xu, C., Zhang, X., Liao, Y.: Designated Verifier Proxy Signature Scheme without Random Oracles. Computers and Mathematics with Applications 57(8), 1352–1364 (2009)zbMATHMathSciNetCrossRefGoogle Scholar
  16. 16.
    Shim, K.A.: Short Designated Verifier Proxy Signatures. Computers and Electrical Engineering 37(2), 180–186 (2011)zbMATHMathSciNetCrossRefGoogle Scholar
  17. 17.
    Zhang, X., Huang, S., Xin, X.: Improved proxy signature for designated verifier. In: Proc. 2011 CIS conf., pp. 231–233. IEEE Press, New York (2011)Google Scholar
  18. 18.
    Lin, H., Wu, T., Huang, S.: An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce. Journal of information science and engineering 28(4), 771–785 (2012)MathSciNetGoogle Scholar
  19. 19.
    Ming, Y., Jin, Q., Zhao, X.: Designated Verifier Proxy Signature Scheme with Multi-warrant in The Standard Model. Journal of Information & Computational Science 10(7), 2097–2107 (2013)CrossRefGoogle Scholar
  20. 20.
    Hsu, C., Lin, H.: Pairing-based Strong Designated Verifier Proxy Signature Scheme with Low Cost. Security and Communication Networks 5(5), 517–522 (2012)CrossRefGoogle Scholar
  21. 21.
    Zhou, C.: Attacks on a Strong Designated Verifier Proxy Signature Scheme. Advanced Science and Technology Letters 48, 7–12 (2014)Google Scholar
  22. 22.
    Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005) CrossRefGoogle Scholar
  23. 23.
    Kang, L., Tang, X., Lu, X., Fan, J.: A Short Signature Scheme in The Standard Model. Cryptology ePrint Archive: Report 2007/398 (2007)Google Scholar
  24. 24.
    Tian, H., Jiang, Z., Liu, Y., Wei, B.: A systematic method to design strong designated verifier signature without random oracles. Cluster Comput 16, 817–827 (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Xiaoming Hu
    • 1
    Email author
  • Hong Lu
    • 1
  • Yan Liu
    • 1
  • Jian Wang
    • 1
  • Wenan Tan
    • 1
  1. 1.College of Computer and Information EngineeringShanghai Second Polytechnic UniversityShanghaiChina

Personalised recommendations