Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model

被引:17
|
作者
Rastegari, Parvin [1 ]
Susilo, Willy [2 ]
Dakhilalian, Mohammad [1 ]
机构
[1] Isfahan Univ Technol, Dept Elect & Comp Engn, Esfahan 8415683111, Iran
[2] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2522, Australia
关键词
Designated verifier signature; Certificateless public key cryptography; Certificateless designated verifier signature; Standard model; Random oracle model; IDENTITY-BASED ENCRYPTION;
D O I
10.1007/s10207-019-00430-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a designated verifier signature (DVS) scheme, the signer (Alice) creates a signature which is only verifiable by a designated verifier (Bob). Furthermore, Bob cannot convince any third party that the signature was produced by Alice. A DVS scheme is applicable in scenarios where Alice must be authenticated to Bob without disturbing her privacy. The de-facto construction of DVS scheme is achieved in a traditional public key infrastructure (PKI) setting, which unfortunately requires a high-cost certificate management. A variant of identity-based (ID-based) setting DVS eliminates the need of certificates, but it introduces a new inherent key escrow problem, which makes it impractical. Certificateless public key cryptography (CL-PKC) is empowered to overcome the problems of PKI and ID-based settings, where it does not suffer from any of the aforementioned problems. However, only a few number of certificateless DVS (CL-DVS) schemes have been proposed in the literature to date. Moreover, all existing CL-DVS schemes are only proven secure in the random oracle model, while some of them are already known to be insecure. We provide three contributions in this paper. First, we revisit the security proofs of existing CL-DVS schemes in the literature and show that unfortunately there are some drawbacks in the proofs of all of those schemes. Second, we concentrate on the recently proposed CL-DVS scheme (IEEE Access 2018) and show a drawback in its security proof which makes it unreliable. Furthermore, we show that this scheme is delegatable in contrast to the author's claim. Finally, we propose a CL-DVS scheme and prove its security requirements in the standard model. Our scheme is not only the first scheme with a complete and correct security proofs, but also the only scheme in the standard model.
引用
收藏
页码:619 / 635
页数:17
相关论文
共 50 条
  • [1] Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
    Parvin Rastegari
    Willy Susilo
    Mohammad Dakhilalian
    [J]. International Journal of Information Security, 2019, 18 : 619 - 635
  • [2] Certificateless Strong Designated Verifier Signature Scheme
    Xiao, Zibi
    Yang, Bo
    Li, Shougui
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 232 - 236
  • [3] An Efficient Certificateless Designated Verifier Signature Scheme
    He, Debiao
    Chen, Jianhua
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (04) : 389 - 396
  • [4] A Certificateless Verifiable Strong Designated Verifier Signature Scheme
    Han, Shu
    Xie, Mande
    Yang, Bailin
    Lu, Rongxing
    Bao, Haiyong
    Lin, Jianhong
    Hong, Hai-Bo
    Gu, Mian-Xue
    Han, Song
    [J]. IEEE ACCESS, 2019, 7 : 126391 - 126408
  • [5] An Efficient Certificateless Short Designated Verifier Signature Scheme
    Chen, Hu
    Song, Rushun
    Zhang, Futai
    Song, Fagen
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4627 - 4632
  • [6] New Certificateless Designated-verifier Proxy Signature Scheme
    Liu Yun-fang
    [J]. INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 585 - 588
  • [7] Certificateless designated verifier signature schemes
    Huang, Xinyi
    Susilo, Willy
    Mu, Yi
    Zhang, Futai
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 15 - +
  • [8] Aggregatable Certificateless Designated Verifier Signature
    Thorncharoensri, Pairat
    Susilo, Willy
    Baek, Joonsang
    [J]. IEEE ACCESS, 2020, 8 : 95019 - 95031
  • [9] A Certificateless Designated Verifier Sanitizable Signature
    Zhan, Yonghua
    Yi, Bixia
    Yang, Yang
    He, Renjie
    Shi, Rui
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 337 - 352
  • [10] Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model
    Shen, Limin
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Hai
    [J]. IET INFORMATION SECURITY, 2019, 13 (03) : 167 - 173