Designated verifier signature schemes: Attacks, new security notions and a new construction

被引:0
|
作者
Lipmaa, H [1 ]
Wang, G
Bao, F
机构
[1] Cybernet AS, Tartu, Estonia
[2] Univ Turin, Tartu, Estonia
[3] I2R, Singapore, Singapore
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We show that the signer can abuse the disavowal protocol in the Jakobsson-Sako-Impagliazzo designated-verifier signature scheme. In addition, we identify a new security property-non-delegatability-that is essential for designated-verifier signatures, and show that several previously proposed designated-verifier schemes are delegatable. We give a rigorous formalisation of the security for designated-verifier signature schemes, and propose a new and efficient designated-verifier signature scheme that is provably unforgeable under a tight reduction to the Decisional Diffie-Hellman problem in the non-programmable random oracle model, and non-delegatable under a loose reduction in the programmable random oracle model. As a direct corollary, we also get a new efficient conventional signature scheme that is provably unforgeable under a tight reduction to the Decisional Diffie-Hellman problem in the non-programmable random oracle plus common reference string model.
引用
收藏
页码:459 / 471
页数:13
相关论文
共 50 条
  • [31] Short (identity-based) strong designated verifier signature schemes
    Huang, Xinyi
    Susilo, Willy
    Mu, Yi
    Zhang, Futai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 214 - 225
  • [32] Highly efficient strong designated verifier signature schemes in the standard model
    Hu, Xiaoming
    Huo, Xin
    Yang, Yinchun
    Wang, Jian
    2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 316 - 320
  • [33] Efficient identity-based strong designated verifier signature schemes
    Duan, Meijiao
    Xu, Jing
    Feng, Dengguo
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 902 - 911
  • [35] A new universal designated verifier transitive signature scheme for big graph data
    Lin, Chao
    Wu, Wei
    Huang, Xinyi
    Xu, Li
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 83 (01) : 73 - 83
  • [36] Security notions for unconditionally secure signature schemes
    Shikata, J
    Hanaoka, G
    Zheng, YL
    Imai, H
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 434 - 449
  • [37] New ID-based universal designated-verifier signature scheme
    Wang, Xiao-Feng
    Zhang, Jing
    Wang, Shang-Ping
    Zhang, Ya-Ling
    Qin, Bo
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2007, 35 (08): : 1432 - 1436
  • [38] A Generic Construction of Designated Verifier Signature from Standard Cryptographic Algorithms
    Wang, Jun-Rui
    Xie, Xin
    Chen, Yu-Chi
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2022, 38 (05) : 1051 - 1063
  • [39] Practical strong designated verifier signature schemes based on double discrete logarithms
    Tso, R
    Okamoto, T
    Okamoto, E
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 113 - 127
  • [40] Online encryption schemes: New security notions and constructions
    Boldyreva, A
    Taesombut, N
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 1 - 14