Provably Secure and Pairing-Based Strong Designated Verifier Signature Scheme with Message Recovery

被引:11
|
作者
Islam, S. K. Hafizul [1 ]
Biswas, G. P. [2 ]
机构
[1] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani 333031, Rajasthan, India
[2] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
关键词
Elliptic curve cryptography; Designated verifier; Message recovery; Co-Bilinear Diffie-Hellman assumption; Provable security; KEY AGREEMENT PROTOCOL; DIGITAL-SIGNATURES; ELLIPTIC CURVE; ATTACKS;
D O I
10.1007/s13369-015-1568-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, an efficient and secure strong designated verifier signature with message recovery scheme is presented using elliptic curve and bilinear pairing. In our scheme, the signer implants a message on the signature and sends it without message to the verifier, who then extracts the original message and validates the message-signature pair. However, an outsider is unable to verify the message-signature pair since the verifier's private key is strictly required for verification. Our scheme has been designed to achieve confidentiality, integrity, authentication and non-repudiation of message transmitted through hostile networks. Our scheme is secure against adaptive chosen message attack in the random oracle model under the intractability assumption of Co-Bilinear Diffie-Hellman problem. Besides, our scheme is computation and communication efficient than other schemes, and hence, it may be useful in many small message applications and also for the resource-constrained environments.
引用
收藏
页码:1069 / 1080
页数:12
相关论文
共 50 条
  • [1] Provably Secure and Pairing-Based Strong Designated Verifier Signature Scheme with Message Recovery
    SK Hafizul Islam
    G. P. Biswas
    [J]. Arabian Journal for Science and Engineering, 2015, 40 : 1069 - 1080
  • [2] Provably Secure and Efficient ID-based Strong Designated Verifier Signature Scheme with Message Recovery
    Li, Min
    Fang, Tao
    [J]. 2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014), 2014, : 287 - 293
  • [3] Pairing-based strong designated verifier proxy signature scheme with low cost
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 517 - 522
  • [4] Provably secure strong designated verifier signature scheme based on coding theory
    Shooshtari, Masoumeh Koochak
    Ahmadian-Attari, Mahmoud
    Aref, Mohammad Reza
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (07)
  • [5] Strong designated verifier signature scheme with message recovery
    Lee, Ii-Seon
    Chang, Jik Hyun
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 801 - +
  • [6] Provably secure blind ID-based strong designated verifier signature scheme
    Zhang, Ning
    Wen, Qiaoyan
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 358 - 362
  • [7] Designated Verifier Strong Blind Signature Scheme with Message Recovery
    He, Junjie
    Sun, Fang
    Qi, Chuanda
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND INFORMATION TECHNOLOGY (ICCCIT 2011), 2011, : 169 - 172
  • [8] Short and provably secure designated verifier proxy signature scheme
    Hu, Xiaoming
    Tan, Wenan
    Xu, Huajie
    Wang, Jian
    [J]. IET INFORMATION SECURITY, 2016, 10 (02) : 69 - 79
  • [9] Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings
    Islam, S. K. Hafizul
    Biswas, G. P.
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2013, 25 (01) : 51 - 61
  • [10] A Pairing-based Blind Signature Scheme with Message Recovery
    Han, Song
    Chang, Elizabeth
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 303 - 308