Abstract
Strong designated verifier signature (SDVS) provides secret authentication service to entities in a computing task. The primitive assures that an entity’s signature is verified only by a designated service provider. It also assures that a transcript about a computing task can be produced by both the entity and its service provider independently. Then neither can prove to a third party that an entity is involved in a task. Currently, most SDVS schemes without random oracles have no strong unforgeability and privacy of signer’s identity. This paper proposes a systematic method to design SDVS schemes without random oracles. It provides a basic scheme with unforgeability and non-transferability properties. Then provides it an SDVS scheme with strong unforgeability and privacy of signer’s identity properties and based on standard assumptions. Finally, a more efficient SDVS scheme is shown based on a non-black box assumption.
Similar content being viewed by others
References
Asaar, M., Salmasizadeh, M.: A pairing based strong designated verifier signature scheme without random oracles. Cryptology ePrint Archive: Report 2012/061 (2012)
Boneh, D., Shen, E., Waters, B.: Strongly unforgeable signatures based on computational Diffie-Hellman. In: PKC’05. LNCS, vol. 3958, pp. 229–240. Springer, Berlin (2005)
Cao, F., Cao, Z.: An identity based universal designated verifier signature scheme secure in the standard model. J. Syst. Softw. 82, 643–649 (2009)
Cramer, R., Damgård, I.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y. (ed.) CRYPTO’94, Santa Barbara, California. LNCS, vol. 839, pp. 174–187. Springer, Berlin (1994)
Cramer, R., Shoup, V.: A practical public-key encryptosystem provable secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO’98, Santa Barbara, California. LNCS, vol. 1462, pp. 13–25. Springer, Berlin (1998)
Huang, Q., Yang, G., Wong, D., Susilo, W.: Efficient strong designated verifier signature schemes without random oracles or delegatability. Cryptology ePrint Archive: Report 2009/518 (2009)
Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT ’96, Saragossa, Spain, May 1996. LNCS, vol. 1070, pp. 143–154. Springer, Berlin (1996)
Kang, L., Tang, X., Lu, X., Fan, J.: A short signature scheme in the standard model. Cryptology ePrint Archive: Report 2007/398 (2007)
Laguillaumie, F., Libert, B., Quisquater, J.: Universal designated verifier signatures without random oracles or non-black box assumptions. In: Security and Cryptography for Networks. LNCS, vol. 4116, pp. 63–77. Springer, Berlin (2006)
Laguillaumie, F., Vergnaud, D.: Designated verifiers signature: anonymity and efficient construction from any bilinear map. In: Blundo, C., Cimato, S. (eds.) SCN 2004, Amalfi, Italy, September 2005. LNCS, vol. 3352, pp. 105–119. Springer, Berlin (2005)
Mao, W.: Modern Cryptography: Theory and Practice, Chap. 10. Prentice Hall, New York (2003)
Möller, B.: Algorithms for multi-exponentiation. In: Vaudenay, S., Youssef, A. (eds.) SAC 2001, Toronto, Canada. LNCS, vol. 2259, pp. 165–180. Springer, Berlin (2001)
Steinfeld, R., Wang, H., Pieprzyk, J.: Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. In: PKC’04. LNCS, vol. 2947, pp. 86–100. Springer, Berlin (2004)
Saeednia, S., Kramer, S., Markovitch, O.: An efficient strong designated verifier signature scheme. In: Lim, J., Lee, D. (eds.) ICISC 2003, Seoul, Korea, November 2004. LNCS, vol. 2971, pp. 40–54. Springer, Berlin (2004)
Tian, H., Sun, X., Wang, M.: A new public key encryption scheme. J. Comput. Sci. Technol. 22(1), 95–102 (2007)
Tian, H., Jiang, Z., Liu, Y., Wei, B.: A non-delegatable strong designated verifier signature without random oracles. In: INCOS 2012, pp. 237–244 (2012)
Vergnaud, D.: New extensions of pairing-based signatures into universal designated verifier signatures. In: Automata, Languages and Programming. LNCS, vol. 4052, pp. 58–69 (2006)
Yoneyama, K., Ushida, M., Ohta, K.: Rigorous security requirements for designated verifier signatures. In: Lai, X., Yung, M., Lin, D. (eds.) Inscrypt 2010. LNCS, vol. 6584, pp. 318–335. Springer, Berlin (2011)
Zhang, R., Furukawa, J., Imai, H.: Short signature and universal designated verifier signature without random oracles. In: ACNS’05. LNCS, vol. 3531, pp. 483–498. Springer, Berlin (2005)
Zhang, H., Ji, C.: An efficient designated verifier signature scheme without random oracles. In: Proc. of First International Symposium on Data, Privacy and E-Commerce, pp. 338–340. IEEE Press, New York (2007)
Acknowledgements
This work is supported by the National Natural Science Foundation of China (Grant Nos. 61003244, 61070168, 61103199), Doctoral Fund of Ministry of Education of China (Grant No. 20120171110027), Fundamental Research Funds for the Central Universities (Grant Nos. 11lgpy71, 11lgzd06), Beijing Municipal Natural Science Foundation (Grant No. 4112052), Science and Technology Planning Project of Guangdong Province (Grant No. 2012B010100032), and the Industry-Education-Research Cooperation Project of Guangdong Province and the Ministry of Education (Grant No. 2012B091000060).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tian, H., Jiang, Z., Liu, Y. et al. A systematic method to design strong designated verifier signature without random oracles. Cluster Comput 16, 817–827 (2013). https://doi.org/10.1007/s10586-013-0255-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-013-0255-x