Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model

被引:17
|
作者
Rastegari, Parvin [1 ]
Susilo, Willy [2 ]
Dakhilalian, Mohammad [1 ]
机构
[1] Isfahan Univ Technol, Dept Elect & Comp Engn, Esfahan 8415683111, Iran
[2] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2522, Australia
关键词
Designated verifier signature; Certificateless public key cryptography; Certificateless designated verifier signature; Standard model; Random oracle model; IDENTITY-BASED ENCRYPTION;
D O I
10.1007/s10207-019-00430-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a designated verifier signature (DVS) scheme, the signer (Alice) creates a signature which is only verifiable by a designated verifier (Bob). Furthermore, Bob cannot convince any third party that the signature was produced by Alice. A DVS scheme is applicable in scenarios where Alice must be authenticated to Bob without disturbing her privacy. The de-facto construction of DVS scheme is achieved in a traditional public key infrastructure (PKI) setting, which unfortunately requires a high-cost certificate management. A variant of identity-based (ID-based) setting DVS eliminates the need of certificates, but it introduces a new inherent key escrow problem, which makes it impractical. Certificateless public key cryptography (CL-PKC) is empowered to overcome the problems of PKI and ID-based settings, where it does not suffer from any of the aforementioned problems. However, only a few number of certificateless DVS (CL-DVS) schemes have been proposed in the literature to date. Moreover, all existing CL-DVS schemes are only proven secure in the random oracle model, while some of them are already known to be insecure. We provide three contributions in this paper. First, we revisit the security proofs of existing CL-DVS schemes in the literature and show that unfortunately there are some drawbacks in the proofs of all of those schemes. Second, we concentrate on the recently proposed CL-DVS scheme (IEEE Access 2018) and show a drawback in its security proof which makes it unreliable. Furthermore, we show that this scheme is delegatable in contrast to the author's claim. Finally, we propose a CL-DVS scheme and prove its security requirements in the standard model. Our scheme is not only the first scheme with a complete and correct security proofs, but also the only scheme in the standard model.
引用
收藏
页码:619 / 635
页数:17
相关论文
共 50 条
  • [21] Certificateless Designated Verifier Anonymous Aggregate Signature Scheme for Healthcare Wireless Sensor Networks
    Deng, Lunzhi
    Yang, Yixian
    Gao, Ronghai
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (11) : 8897 - 8909
  • [22] Another Efficient Provably Secure Designated Verifier Signature Scheme In the Standard Security Model
    Zhang, Hanhong
    Geng, Qin
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 287 - 291
  • [23] An Obfuscatable Designated Verifier Signature Scheme
    Shi, Yang
    Fan, Hongfei
    Liu, Qin
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (02) : 271 - 285
  • [24] Designated verifier proxy signature scheme
    Liao, Yongjian
    Lu, Qing
    Qin, Zhiguang
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 235 - 238
  • [25] On the Security of a Designated-Verifier Proxy Signature Scheme and Its Improved Scheme (revisited)
    Zhang, Jianhong
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2196 - 2199
  • [26] On the security of group signature scheme and designated verifier signature scheme
    Zhang, Jianhong
    Geng, Qin
    [J]. PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 351 - 358
  • [27] Certificateless convertible limited verifier signature scheme
    Wu, Chenhuang
    Huang, Zhenjie
    [J]. TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 910 - +
  • [28] Efficient and Provably-secure Certificateless Strong Designated Verifier Signature Scheme without Pairings
    Duan, Meijiao
    Zhu, Jianming
    Li, Yang
    [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2018, 25 (06): : 1801 - 1809
  • [29] A multi-signer universal designated multi-verifier signature scheme in the standard model
    Ming, Yang
    Jin, Qiang
    Zhao, Xiangmo
    [J]. Journal of Computational Information Systems, 2013, 9 (09): : 3751 - 3758
  • [30] Strong designated verifier ring signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    [J]. INNOVATIONS AND ADVANCED TECHNIQUES IN COMPUTER AND INFORMATION SCIENCES AND ENGINEERING, 2007, : 543 - 547