Designated verifier signature schemes: Attacks, new security notions and a new construction

被引:0
|
作者
Lipmaa, H [1 ]
Wang, G
Bao, F
机构
[1] Cybernet AS, Tartu, Estonia
[2] Univ Turin, Tartu, Estonia
[3] I2R, Singapore, Singapore
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We show that the signer can abuse the disavowal protocol in the Jakobsson-Sako-Impagliazzo designated-verifier signature scheme. In addition, we identify a new security property-non-delegatability-that is essential for designated-verifier signatures, and show that several previously proposed designated-verifier schemes are delegatable. We give a rigorous formalisation of the security for designated-verifier signature schemes, and propose a new and efficient designated-verifier signature scheme that is provably unforgeable under a tight reduction to the Decisional Diffie-Hellman problem in the non-programmable random oracle model, and non-delegatable under a loose reduction in the programmable random oracle model. As a direct corollary, we also get a new efficient conventional signature scheme that is provably unforgeable under a tight reduction to the Decisional Diffie-Hellman problem in the non-programmable random oracle plus common reference string model.
引用
收藏
页码:459 / 471
页数:13
相关论文
共 50 条
  • [41] Designated Verifier Signature Transformation: A New Framework for One-Time Delegating Verifiability
    Lin, Jian-Feng
    Wang, Jun-Rui
    Chang, Che-Chia
    Chen, Yu-Chi
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [42] Forgery Attacks on Lee-Chang's Strong Designated Verifier Signature Scheme
    Hyun, Suhng-Ill
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING SYMPOSIA, VOLS 1-5, PROCEEDINGS, 2008, : 101 - +
  • [43] Relations among security notions for undeniable signature schemes
    Kurosawa, Kaoru
    Heng, Swee-Huay
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 34 - 48
  • [44] New signature schemes with tight security reductions
    Qian, Haifeng
    Li, Zhibin
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1323 - 1326
  • [45] A new efficient identity-based strong designated verifier signature scheme with message recovery
    Li, Min
    International Journal of Hybrid Information Technology, 2015, 8 (03): : 165 - 176
  • [46] Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model
    Shen, Limin
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Hai
    IET INFORMATION SECURITY, 2019, 13 (03) : 167 - 173
  • [47] Another Efficient Provably Secure Designated Verifier Signature Scheme In the Standard Security Model
    Zhang, Hanhong
    Geng, Qin
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 287 - 291
  • [48] A Tight Security Reduction Designated Verifier Proxy Signature Scheme Without Random Oracle
    Hu, Xiaoming
    Lu, Hong
    Liu, Yan
    Wang, Jian
    Tan, Wenan
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT I, 2015, 9155 : 98 - 109
  • [49] On the Security of a Designated-Verifier Proxy Signature Scheme and Its Improved Scheme (revisited)
    Zhang, Jianhong
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2196 - 2199
  • [50] Efficient strong designated verifier signature schemes without random oracle or with non-delegatability
    Huang, Qiong
    Yang, Guomin
    Wong, Duncan S.
    Susilo, Willy
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (06) : 373 - 385