Abstract
In this paper, we introduce a new cryptographic primitive named Designated Verifier Proxy Re-Signature (DVPRS). Different from a normal proxy re-signature, our DVPRS is defined based on the notion of Designated Verifier Signature (DVS) which is very useful in many applications that require “deniable authentication”. Since a DVS can only be verified by a designated verifier, in addition to the re-sign algorithm which allows a proxy to use a resign key to change the signer of a DVS on a message, we also define the re-designate-verifier algorithm for DVPRS which allows a proxy to change the designated verifier of a DVS. We present the formal definition, security model, and an efficient construction of DVPRS, and prove its security under some standard assumptions. We show that DVPRS is very useful in many communication and network applications that require deniable and/or anonymous authentication.
Similar content being viewed by others
References
Ateniese, G., & Hohenberger, S. (2005). Proxy re-signatures: new definitions, algorithms, and applications. In Proceedings of the 12th ACM conference on Computer and communications security, pp. 310–319. ACM.
Bellare, M., & Rogaway, P. (1993). Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on Computer and communications security, pp. 62–73. ACM.
Blaze, M., Bleumer, G., & Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In Advances in Cryptology - EUROCRYPT’98, pp. 127–144. Springer.
Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the weil pairing. In Advances in Cryptology - ASIACRYPT 2001, pp. 514–532. Springer.
Chow, S. S., & Phan, R. C. W. (2008). Proxy re-signatures in the standard model. In Information Security Conference, pp. 260–276. Springer
Galbraith, S.D., & Mao, W. (2003). Invisibility and anonymity of undeniable and confirmer signatures. In Topics in Cryptology - CT-RSA 2003, pp. 80–97. Springer.
Huang, Q., Yang, G., Wong, D. S., & Susilo, W. (2011). Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. International Journal of Information Security, 10(6), 373–385.
Huang, Q., Yang, G., Wong, D. S., & Susilo, W. (2011). Identity-based strong designated verifier signature revisited. Journal of Systems and Software, 84(1), 120–129.
Huang, X., Susilo, W., Mu, Y., & Wu, W. (2008). Secure universal designated verifier signature without random oracles. International Journal of Information Security, 7(3), 171–183.
Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2006). Short (identity-based) strong designated verifier signature schemes. In Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, Lecture Notes in Computer Science, vol. 3903, pp. 214–225. Springer.
Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2008). Short designated verifier signature scheme and its identity-based variant. International Journal of Network Security, 6(1), 82–93.
Jakobsson, M., Sako, K., & Impagliazzo, R. (1996). Designated verifier proofs and their applications. In Advances in Cryptology - EUROCRYPT, pp. 143–154. Springer.
Kang, B., Boyd, C., & Dawson, E. (2009). Identity-based strong designated verifier signature schemes: attacks and new construction. Computers & Electrical Engineering, 35(1), 49–53.
Laguillaumie, F., & Vergnaud, D. (2004). Designated verifier signatures: anonymity and efficient construction from any bilinear map. In 4th International Conference on Security in Communication Networks, pp. 105–119. Springer.
Laguillaumie, F., & Vergnaud, D. (2004). Multi-designated verifiers signatures. In International Conference on Information and Communications Security, pp. 495–507.
Libert, B., & Vergnaud, D. (2008). Multi-use unidirectional proxy re-signatures. In Proceedings of the 15th ACM conference on Computer and communications security, pp. 511–520. ACM.
Shao, J., Cao, Z., Wang, L., & Liang, X. (2007). Proxy re-signature schemes without random oracles. In Progress in Cryptology - INDOCRYPT 2007, pp. 197–209. Springer.
Shao, J., Feng, M., Zhu, B., Cao, Z., & Liu, P. (2010). The security model of unidirectional proxy re-signature with private re-signature key. In Australasian Conference on Information Security and Privacy, pp. 216–232. Springer.
Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J. (2003). Universal designated-verifier signatures. In Advances in Cryptology - Asiacrypt 2003, pp. 523–542. Springer.
Susilo, W., Zhang, F., & Mu, Y. (2004). Identity-based strong designated verifier signature schemes. In Australasian Conference on Information Security and Privacy, pp. 313–324. Springer.
Vergnaud, D. (2006). New extensions of pairing-based signatures into universal designated verifier signatures. In ICALP, pp. 58–69.
Waters, B. (2005). Efficient identity-based encryption without random oracles. In: Advances in Cryptology - EUROCRYPT, pp. 114–127.
Zhang, R., Furukawa, J., & Imai, H. (2005). Short signature and universal designated verifier signature without random oracles. In Applied Cryptography and Network Security, pp. 483–498.
Acknowledgments
This work was supported by National Natural Science Foundation of China under Grant 61702268.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wei, J., Yang, G. & Mu, Y. Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications. Wireless Pers Commun 97, 3017–3030 (2017). https://doi.org/10.1007/s11277-017-4658-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4658-5