Abstract
A strong designated verifier signature (SDVS) is a special variant of digital signatures, since it only allows a designated recipient to verify the signer’s signature. The transcript simulation property of such signatures also prohibits a designated verifier from arbitrarily transferring his/her conviction to any third party. When implemented in certificateless cryptosystems, a certificateless SDVS is unnecessary to manage public key certificates and deal with the key-escrow problem of conventional identity-based systems. In 2014, Shim pointed out a crucial security property called non-delegatability for SDVS schemes. This property states that anyone should not be able to generate a valid SDVS without obtaining either the signer’s or the verifier’s private key. In other worlds, a non-delegatable SDVS scheme must ensure that any malicious adversary cannot forge a valid signature even if he/she has gotten the shared secret value between a signer and an intended verifier. In this paper, we first demonstrate that a previously proposed efficient certificateless SDVS scheme is vulnerable to the delegatability attack and then further propose an improved variant.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29
Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_20
Chen, Y., Zhao, Y., Xiong, H., Yue, F.: A certificateless strong designated verifier signature scheme with non-delegatability. Int. J. Netw. Secur. 19(4), 573–582 (2017)
Choi, K.Y., Park, J.H., Lee, D.H.: A new provably secure certificateless short signature scheme. Comput. Math Appl. 61(7), 1760–1768 (2011)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theor. IT-22(6), 644–654 (1976)
Du, H., Wen, Q.: Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Cryptology ePrint Archive, 2007/250 (2007). http://eprint.iacr.org/2007/250
Fan, C.I., Hsu, R.H., Ho, P.H.: Cryptanalysis on Du-Wen certificateless short signature scheme. In: Proceedings of the Fourth Joint Workshop on Information Security (JWIS 2009), pp. 1–7 (2009)
He, D., Chen, J.: An efficient certificateless designated verifier signature scheme. Int. Arab J. Inf. Technol. 10(4), 389–396 (2013)
Hsu, C.L., Lin, H.Y.: Universal forgery attack on a strong designated verifier signature scheme. Int. Arab J. Inf. Technol. 11(5), 425–428 (2014)
Huang, X., Susilo, W., Mu, Y., Zhang, F.: Certificateless designated verifier signature schemes. In: Proceedings of the IEEE 20th International Conference on Advanced Information Networking and Applications (AINA 2006), vol. 2, pp. 15–19 (2006)
Islam, S.K.H., Biswas, G.P.: Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings. J. King Saud Univ. Comput. Info. Sci. 25(1), 51–61 (2013)
Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9_13
Kang, B., Boyd, C., Dawson, E.: A novel identity-based strong designated verifier signature scheme. J. Syst. Softw. 82(2), 270–273 (2009)
Lee, J.S., Chang, J.H.: Strong designated verifier signature scheme with message recovery. In: The 9th International Conference on Advanced Communication Technology, vol. 1, pp. 801–803 (2007)
Lin, H.Y., Wu, T.S., Yeh, Y.S.: A DL based short strong designated verifier signature scheme with low computation. J. Inf. Sci. Eng. 27(2), 451–463 (2011)
Saeednia, S., Kremer, S., Markowitch, O.: An efficient strong designated verifier signature scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24691-6_4
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Susilo, W., Zhang, F., Mu, Y.: Identity-based strong designated verifier signature schemes. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 313–324. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-27800-9_27
Tian, M., Huang, L., Yang, W.: On the security of a certificateless short signature scheme. Cryptology ePrint Archive, 2011/418 (2011). http://eprint.iacr.org/2011/419
Shim, K.A.: On delegatability of designated verifier signature schemes. Inf. Sci. 281(10), 365–372 (2014)
Yang, B., Hu, Z., Xiao, Z.: Efficient certificateless strong designated verifier signature scheme. In: Proceedings of International Conference on Computational Intelligence and Security (CIS 2009), vol. 1, pp. 432–436 (2009)
Acknowledgement
This work was supported in part by the Ministry of Science and Technology of Republic of China under the contract number MOST 107-2221-E-019-017.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lin, HY., Wu, CH., Jiang, YR. (2019). On Delegatability of a Certificateless Strong Designated Verifier Signature Scheme. In: Chang, CY., Lin, CC., Lin, HH. (eds) New Trends in Computer Technologies and Applications. ICS 2018. Communications in Computer and Information Science, vol 1013. Springer, Singapore. https://doi.org/10.1007/978-981-13-9190-3_61
Download citation
DOI: https://doi.org/10.1007/978-981-13-9190-3_61
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9189-7
Online ISBN: 978-981-13-9190-3
eBook Packages: Computer ScienceComputer Science (R0)