Designated verifier signature schemes: Attacks, new security notions and a new construction

被引:0
|
作者
Lipmaa, H [1 ]
Wang, G
Bao, F
机构
[1] Cybernet AS, Tartu, Estonia
[2] Univ Turin, Tartu, Estonia
[3] I2R, Singapore, Singapore
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We show that the signer can abuse the disavowal protocol in the Jakobsson-Sako-Impagliazzo designated-verifier signature scheme. In addition, we identify a new security property-non-delegatability-that is essential for designated-verifier signatures, and show that several previously proposed designated-verifier schemes are delegatable. We give a rigorous formalisation of the security for designated-verifier signature schemes, and propose a new and efficient designated-verifier signature scheme that is provably unforgeable under a tight reduction to the Decisional Diffie-Hellman problem in the non-programmable random oracle model, and non-delegatable under a loose reduction in the programmable random oracle model. As a direct corollary, we also get a new efficient conventional signature scheme that is provably unforgeable under a tight reduction to the Decisional Diffie-Hellman problem in the non-programmable random oracle plus common reference string model.
引用
收藏
页码:459 / 471
页数:13
相关论文
共 50 条
  • [1] Identity-based strong designated verifier signature schemes: Attacks and new construction
    Kang, Baoyuan
    Boyd, Colin
    Dawson, Ed
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 49 - 53
  • [2] Study on Designated Verifier Proxy Signature Schemes with Provable Security
    Hu, Xiaoming
    Yang, Yinchun
    Zhang, Xiaojun
    Xu, Huajie
    Wang, Jian
    PROCEEDINGS OF 2016 2ND INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2016, : 5 - 9
  • [3] Certificateless designated verifier signature schemes
    Huang, Xinyi
    Susilo, Willy
    Mu, Yi
    Zhang, Futai
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 15 - +
  • [4] On delegatability of designated verifier signature schemes
    Shim, Kyung-Ah
    INFORMATION SCIENCES, 2014, 281 : 365 - 372
  • [5] RESEARCH OF ATTACK ON SHORT DESIGNATED VERIFIER SIGNATURE AND ITS NEW CONSTRUCTION
    Tao, Zhongyu
    Yue, Feng
    Li, Jianping
    2015 12TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2015, : 90 - 93
  • [6] A New Strong Designated Verifier Signature Scheme
    Shapuan, N.
    Ismail, E. S.
    2017 UKM FST POSTGRADUATE COLLOQUIUM, 2018, 1940
  • [7] Attacks on a Universal Designated Verifier Signature Scheme
    Li Yanping
    Pang Liaojun
    Wang Yumin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 27 - +
  • [8] Universal designated multi verifier signature schemes
    Ng, CY
    Susilo, W
    Mu, Y
    11th International Conference on Parallel and Distributed Systems Workshops, Vol II, Proceedings,, 2005, : 305 - 309
  • [10] Designated-verifier proxy signature schemes
    Wang, GL
    Security and Privacy in the Age of Ubiquitous Computing, 2005, 181 : 409 - 423