Skip to main content

On Delegatability of a Certificateless Strong Designated Verifier Signature Scheme

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1013))

Abstract

A strong designated verifier signature (SDVS) is a special variant of digital signatures, since it only allows a designated recipient to verify the signer’s signature. The transcript simulation property of such signatures also prohibits a designated verifier from arbitrarily transferring his/her conviction to any third party. When implemented in certificateless cryptosystems, a certificateless SDVS is unnecessary to manage public key certificates and deal with the key-escrow problem of conventional identity-based systems. In 2014, Shim pointed out a crucial security property called non-delegatability for SDVS schemes. This property states that anyone should not be able to generate a valid SDVS without obtaining either the signer’s or the verifier’s private key. In other worlds, a non-delegatable SDVS scheme must ensure that any malicious adversary cannot forge a valid signature even if he/she has gotten the shared secret value between a signer and an intended verifier. In this paper, we first demonstrate that a previously proposed efficient certificateless SDVS scheme is vulnerable to the delegatability attack and then further propose an improved variant.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29

    Chapter  Google Scholar 

  2. Chaum, D., van Antwerpen, H.: Undeniable signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 212–216. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_20

    Chapter  Google Scholar 

  3. Chen, Y., Zhao, Y., Xiong, H., Yue, F.: A certificateless strong designated verifier signature scheme with non-delegatability. Int. J. Netw. Secur. 19(4), 573–582 (2017)

    Google Scholar 

  4. Choi, K.Y., Park, J.H., Lee, D.H.: A new provably secure certificateless short signature scheme. Comput. Math Appl. 61(7), 1760–1768 (2011)

    Article  MathSciNet  Google Scholar 

  5. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theor. IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  6. Du, H., Wen, Q.: Efficient and provably-secure certificateless short signature scheme from bilinear pairings. Cryptology ePrint Archive, 2007/250 (2007). http://eprint.iacr.org/2007/250

  7. Fan, C.I., Hsu, R.H., Ho, P.H.: Cryptanalysis on Du-Wen certificateless short signature scheme. In: Proceedings of the Fourth Joint Workshop on Information Security (JWIS 2009), pp. 1–7 (2009)

    Google Scholar 

  8. He, D., Chen, J.: An efficient certificateless designated verifier signature scheme. Int. Arab J. Inf. Technol. 10(4), 389–396 (2013)

    Google Scholar 

  9. Hsu, C.L., Lin, H.Y.: Universal forgery attack on a strong designated verifier signature scheme. Int. Arab J. Inf. Technol. 11(5), 425–428 (2014)

    Google Scholar 

  10. Huang, X., Susilo, W., Mu, Y., Zhang, F.: Certificateless designated verifier signature schemes. In: Proceedings of the IEEE 20th International Conference on Advanced Information Networking and Applications (AINA 2006), vol. 2, pp. 15–19 (2006)

    Google Scholar 

  11. Islam, S.K.H., Biswas, G.P.: Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings. J. King Saud Univ. Comput. Info. Sci. 25(1), 51–61 (2013)

    Google Scholar 

  12. Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9_13

    Chapter  Google Scholar 

  13. Kang, B., Boyd, C., Dawson, E.: A novel identity-based strong designated verifier signature scheme. J. Syst. Softw. 82(2), 270–273 (2009)

    Article  Google Scholar 

  14. Lee, J.S., Chang, J.H.: Strong designated verifier signature scheme with message recovery. In: The 9th International Conference on Advanced Communication Technology, vol. 1, pp. 801–803 (2007)

    Google Scholar 

  15. Lin, H.Y., Wu, T.S., Yeh, Y.S.: A DL based short strong designated verifier signature scheme with low computation. J. Inf. Sci. Eng. 27(2), 451–463 (2011)

    MathSciNet  Google Scholar 

  16. Saeednia, S., Kremer, S., Markowitch, O.: An efficient strong designated verifier signature scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24691-6_4

    Chapter  Google Scholar 

  17. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  18. Susilo, W., Zhang, F., Mu, Y.: Identity-based strong designated verifier signature schemes. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 313–324. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-27800-9_27

    Chapter  Google Scholar 

  19. Tian, M., Huang, L., Yang, W.: On the security of a certificateless short signature scheme. Cryptology ePrint Archive, 2011/418 (2011). http://eprint.iacr.org/2011/419

  20. Shim, K.A.: On delegatability of designated verifier signature schemes. Inf. Sci. 281(10), 365–372 (2014)

    Article  MathSciNet  Google Scholar 

  21. Yang, B., Hu, Z., Xiao, Z.: Efficient certificateless strong designated verifier signature scheme. In: Proceedings of International Conference on Computational Intelligence and Security (CIS 2009), vol. 1, pp. 432–436 (2009)

    Google Scholar 

Download references

Acknowledgement

This work was supported in part by the Ministry of Science and Technology of Republic of China under the contract number MOST 107-2221-E-019-017.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Han-Yu Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lin, HY., Wu, CH., Jiang, YR. (2019). On Delegatability of a Certificateless Strong Designated Verifier Signature Scheme. In: Chang, CY., Lin, CC., Lin, HH. (eds) New Trends in Computer Technologies and Applications. ICS 2018. Communications in Computer and Information Science, vol 1013. Springer, Singapore. https://doi.org/10.1007/978-981-13-9190-3_61

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-9190-3_61

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-9189-7

  • Online ISBN: 978-981-13-9190-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics