Strong Designated Verifier Signature Scheme Resisting Replay Attack

被引:7
|
作者
Zhang, Yulei [1 ]
Wang, Caifen [1 ]
Li, Yahong [1 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou, Peoples R China
来源
INFORMATION TECHNOLOGY AND CONTROL | 2015年 / 44卷 / 02期
基金
中国国家自然科学基金;
关键词
strong designated verifier signature; message recover; time stamp; signcryption; EFFICIENT; SIGNCRYPTION;
D O I
10.5755/j01.itc.44.2.7625
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Strong designated verifier signature shows that only designated user can verify the validity of the signature, others who have not signer's private key or verifier's private key cannot judge the signature's originator. Lee et al. presented a designated verifier signature scheme to realize signature's verification in the limited time. We demonstrate that Lee et al.'s scheme is insecure. Other legal users can forge valid signatures which convince designated verifier. In this paper, we show a concrete forgery attack of Lee et al.'s scheme and propose a new strong designated verifier signature scheme with time limit. In our new scheme, message and time stamp don't need transmit in public, which are embedded in signature via the method of signcryption. Only signer and designated verifier can recover those secrete values. Based on the Bilinear Diffie-Hellman problem and Pre-Image Resistance assumption, it is proved that new strong designated verifier signature scheme can resist the ordinary forgery attack and replay attack, and enforce signature verification with time limit.
引用
收藏
页码:165 / 171
页数:7
相关论文
共 50 条
  • [1] Universal Forgery Attack on a Strong Designated Verifier Signature Scheme
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (05) : 425 - 428
  • [2] Strong designated verifier ring signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    [J]. INNOVATIONS AND ADVANCED TECHNIQUES IN COMPUTER AND INFORMATION SCIENCES AND ENGINEERING, 2007, : 543 - 547
  • [3] An efficient strong designated verifier signature scheme
    Saeednia, S
    Kremer, S
    Markowitch, O
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 40 - 54
  • [4] Certificateless Strong Designated Verifier Signature Scheme
    Xiao, Zibi
    Yang, Bo
    Li, Shougui
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 232 - 236
  • [5] An improved strong designated verifier signature scheme
    Li, Chao
    Zhang, SongSong
    Zhang, Yilai
    Xie, Yong
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (12):
  • [6] A New Strong Designated Verifier Signature Scheme
    Shapuan, N.
    Ismail, E. S.
    [J]. 2017 UKM FST POSTGRADUATE COLLOQUIUM, 2018, 1940
  • [7] A Strong Designated-verifier Proxy Signature scheme
    Zhang, Bo
    Xu, Qiuliang
    [J]. WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 569 - 572
  • [8] A Certificateless Verifiable Strong Designated Verifier Signature Scheme
    Han, Shu
    Xie, Mande
    Yang, Bailin
    Lu, Rongxing
    Bao, Haiyong
    Lin, Jianhong
    Hong, Hai-Bo
    Gu, Mian-Xue
    Han, Song
    [J]. IEEE ACCESS, 2019, 7 : 126391 - 126408
  • [9] Strong designated verifier signature scheme with message recovery
    Lee, Ii-Seon
    Chang, Jik Hyun
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 801 - +
  • [10] Lattice based strong designated verifier signature scheme
    Zhang, Ping
    Chi, Huanhuan
    Li, Jinbo
    Shang, Youlin
    [J]. Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2023, 49 (06): : 1294 - 1300