Skip to main content
Log in

Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we introduce a new cryptographic primitive named Designated Verifier Proxy Re-Signature (DVPRS). Different from a normal proxy re-signature, our DVPRS is defined based on the notion of Designated Verifier Signature (DVS) which is very useful in many applications that require “deniable authentication”. Since a DVS can only be verified by a designated verifier, in addition to the re-sign algorithm which allows a proxy to use a resign key to change the signer of a DVS on a message, we also define the re-designate-verifier algorithm for DVPRS which allows a proxy to change the designated verifier of a DVS. We present the formal definition, security model, and an efficient construction of DVPRS, and prove its security under some standard assumptions. We show that DVPRS is very useful in many communication and network applications that require deniable and/or anonymous authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Ateniese, G., & Hohenberger, S. (2005). Proxy re-signatures: new definitions, algorithms, and applications. In Proceedings of the 12th ACM conference on Computer and communications security, pp. 310–319. ACM.

  2. Bellare, M., & Rogaway, P. (1993). Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on Computer and communications security, pp. 62–73. ACM.

  3. Blaze, M., Bleumer, G., & Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In Advances in Cryptology - EUROCRYPT’98, pp. 127–144. Springer.

  4. Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the weil pairing. In Advances in Cryptology - ASIACRYPT 2001, pp. 514–532. Springer.

  5. Chow, S. S., & Phan, R. C. W. (2008). Proxy re-signatures in the standard model. In Information Security Conference, pp. 260–276. Springer

  6. Galbraith, S.D., & Mao, W. (2003). Invisibility and anonymity of undeniable and confirmer signatures. In Topics in Cryptology - CT-RSA 2003, pp. 80–97. Springer.

  7. Huang, Q., Yang, G., Wong, D. S., & Susilo, W. (2011). Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. International Journal of Information Security, 10(6), 373–385.

    Article  Google Scholar 

  8. Huang, Q., Yang, G., Wong, D. S., & Susilo, W. (2011). Identity-based strong designated verifier signature revisited. Journal of Systems and Software, 84(1), 120–129.

    Article  Google Scholar 

  9. Huang, X., Susilo, W., Mu, Y., & Wu, W. (2008). Secure universal designated verifier signature without random oracles. International Journal of Information Security, 7(3), 171–183.

    Article  Google Scholar 

  10. Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2006). Short (identity-based) strong designated verifier signature schemes. In Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, Lecture Notes in Computer Science, vol. 3903, pp. 214–225. Springer.

  11. Huang, X., Susilo, W., Mu, Y., & Zhang, F. (2008). Short designated verifier signature scheme and its identity-based variant. International Journal of Network Security, 6(1), 82–93.

    Google Scholar 

  12. Jakobsson, M., Sako, K., & Impagliazzo, R. (1996). Designated verifier proofs and their applications. In Advances in Cryptology - EUROCRYPT, pp. 143–154. Springer.

  13. Kang, B., Boyd, C., & Dawson, E. (2009). Identity-based strong designated verifier signature schemes: attacks and new construction. Computers & Electrical Engineering, 35(1), 49–53.

    Article  MATH  Google Scholar 

  14. Laguillaumie, F., & Vergnaud, D. (2004). Designated verifier signatures: anonymity and efficient construction from any bilinear map. In 4th International Conference on Security in Communication Networks, pp. 105–119. Springer.

  15. Laguillaumie, F., & Vergnaud, D. (2004). Multi-designated verifiers signatures. In International Conference on Information and Communications Security, pp. 495–507.

  16. Libert, B., & Vergnaud, D. (2008). Multi-use unidirectional proxy re-signatures. In Proceedings of the 15th ACM conference on Computer and communications security, pp. 511–520. ACM.

  17. Shao, J., Cao, Z., Wang, L., & Liang, X. (2007). Proxy re-signature schemes without random oracles. In Progress in Cryptology - INDOCRYPT 2007, pp. 197–209. Springer.

  18. Shao, J., Feng, M., Zhu, B., Cao, Z., & Liu, P. (2010). The security model of unidirectional proxy re-signature with private re-signature key. In Australasian Conference on Information Security and Privacy, pp. 216–232. Springer.

  19. Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J. (2003). Universal designated-verifier signatures. In Advances in Cryptology - Asiacrypt 2003, pp. 523–542. Springer.

  20. Susilo, W., Zhang, F., & Mu, Y. (2004). Identity-based strong designated verifier signature schemes. In Australasian Conference on Information Security and Privacy, pp. 313–324. Springer.

  21. Vergnaud, D. (2006). New extensions of pairing-based signatures into universal designated verifier signatures. In ICALP, pp. 58–69.

  22. Waters, B. (2005). Efficient identity-based encryption without random oracles. In: Advances in Cryptology - EUROCRYPT, pp. 114–127.

  23. Zhang, R., Furukawa, J., & Imai, H. (2005). Short signature and universal designated verifier signature without random oracles. In Applied Cryptography and Network Security, pp. 483–498.

Download references

Acknowledgments

This work was supported by National Natural Science Foundation of China under Grant 61702268.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiannan Wei.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wei, J., Yang, G. & Mu, Y. Designated Verifier Proxy Re-signature for Deniable and Anonymous Wireless Communications. Wireless Pers Commun 97, 3017–3030 (2017). https://doi.org/10.1007/s11277-017-4658-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4658-5

Keywords

Navigation