Provably Secure and Pairing-Based Strong Designated Verifier Signature Scheme with Message Recovery

被引:0
|
作者
SK Hafizul Islam
G. P. Biswas
机构
[1] Birla Institute of Technology and Science,Department of Computer Science and Information Systems
[2] Indian School of Mines,Department of Computer Science and Engineering
关键词
Elliptic curve cryptography; Designated verifier; Message recovery; Co-Bilinear Diffie–Hellman assumption; Provable security;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, an efficient and secure strong designated verifier signature with message recovery scheme is presented using elliptic curve and bilinear pairing. In our scheme, the signer implants a message on the signature and sends it without message to the verifier, who then extracts the original message and validates the message-signature pair. However, an outsider is unable to verify the message-signature pair since the verifier’s private key is strictly required for verification. Our scheme has been designed to achieve confidentiality, integrity, authentication and non-repudiation of message transmitted through hostile networks. Our scheme is secure against adaptive chosen message attack in the random oracle model under the intractability assumption of Co-Bilinear Diffie–Hellman problem. Besides, our scheme is computation and communication efficient than other schemes, and hence, it may be useful in many small message applications and also for the resource-constrained environments.
引用
收藏
页码:1069 / 1080
页数:11
相关论文
共 50 条
  • [1] Provably Secure and Pairing-Based Strong Designated Verifier Signature Scheme with Message Recovery
    Islam, S. K. Hafizul
    Biswas, G. P.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (04) : 1069 - 1080
  • [2] Provably Secure and Efficient ID-based Strong Designated Verifier Signature Scheme with Message Recovery
    Li, Min
    Fang, Tao
    [J]. 2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014), 2014, : 287 - 293
  • [3] Pairing-based strong designated verifier proxy signature scheme with low cost
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 517 - 522
  • [4] Provably secure strong designated verifier signature scheme based on coding theory
    Shooshtari, Masoumeh Koochak
    Ahmadian-Attari, Mahmoud
    Aref, Mohammad Reza
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (07)
  • [5] Strong designated verifier signature scheme with message recovery
    Lee, Ii-Seon
    Chang, Jik Hyun
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 801 - +
  • [6] Provably secure blind ID-based strong designated verifier signature scheme
    Zhang, Ning
    Wen, Qiaoyan
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 358 - 362
  • [7] Designated Verifier Strong Blind Signature Scheme with Message Recovery
    He, Junjie
    Sun, Fang
    Qi, Chuanda
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND INFORMATION TECHNOLOGY (ICCCIT 2011), 2011, : 169 - 172
  • [8] Short and provably secure designated verifier proxy signature scheme
    Hu, Xiaoming
    Tan, Wenan
    Xu, Huajie
    Wang, Jian
    [J]. IET INFORMATION SECURITY, 2016, 10 (02) : 69 - 79
  • [9] Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings
    Islam, S. K. Hafizul
    Biswas, G. P.
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2013, 25 (01) : 51 - 61
  • [10] A Pairing-based Blind Signature Scheme with Message Recovery
    Han, Song
    Chang, Elizabeth
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 303 - 308