Skip to main content
Log in

On delegatability of MDVS schemes

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

In a designated verifier signature (DVS) scheme, a signer (Alice) generates a signature which can only be verified by a designated verifier (Bob) chosen by her. Moreover, Bob cannot transfer his conviction about Alice’s signature to any third party. A DVS scheme provides the capability of authenticating Alice to Bob without disrupting her privacy. A multi designated verifier signature (MDVS) scheme is an extension of a DVS which consists of multiple designated verifiers. Non-delegatability is an essential property of a DVS scheme in scenarios where the responsibility of a signer (Alice) is important and she must not be able to delegate the signing rights to another entity. In this paper, we discuss on all MDVS schemes proposed up to now (to the best of our knowledge) and show that all of them are delegatable. As a result, proposing a non-delegatable MDVS scheme is an open research problem in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  2. Chaum, D., Van Antwerpen, H.: Undeniable signatures, In: Conference on the Theory and Application of Cryptology, Springer, New York, pp. 212–216 (1989)

  3. Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, pp. 143–154 (1996)

  4. Chaum, D.: Private signature and proof systems, U.S. Patent 5493614 (1996)

  5. Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J.: Universal designated-verifier signatures. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, Heidelberg, pp. 523–542 (2003)

  6. Desmedt, Y.: Verifier-designated signatures, Rump session. Crypto 3 (2003)

  7. Laguillaumie, F., Vergnaud, D.: Multi-designated verifiers signatures, In: International Conference on Information and Communications Security, Springer, Berlin, Heidelberg, pp. 495–507 (2004)

  8. Ng, C. Y., Susilo, W., Mu, Y.: Universal designated multi verifier signature schemes. In: Proceedings 11th International Conference on Parallel and Distributed Systems, IEEE, vol. 2, pp. 305–309 (2005)

  9. Shailaja, G., Kumar, K.P., Saxena, A.: Universal designated multi verifier signature without random oracles. In: 9th International Conference on Information Technology, ICIT’06, IEEE, pp. 168–171 (2006)

  10. Chow, S.S.: Identity-based strong multi-designated verifiers signatures. In: European Public Key Infrastructure Workshop, Springer, Berlin, pp. 257–259 (2006)

  11. Ng, C.Y., Susilo, W., Mu, Y.: Designated group credentials, In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ACM, pp. 59–65 (2006)

  12. Laguillaumie, F., Vergnaud, D.: Multi-designated verifiers signatures: anonymity without encryption. Inf. Process.Lett. 102(2–3), 127–132 (2007)

    Article  MathSciNet  Google Scholar 

  13. Li, Y., Susilo, W., Mu, Y., Pei, D.: Designated verifier signature: definition, framework and new constructions. In: International Conference on Ubiquitous Intelligence and Computing, Springer, Berlin, pp. 1191–1200 (2007)

  14. Chow, S.S.: Multi-designated verifiers signatures revisited. IJ Netw. Secur. 7(3), 348–357 (2008)

    Google Scholar 

  15. Yang, M., Yumin, W.: Universal designated multi verifier signature scheme without random oracles. Wuhan Univ. J. Nat. Sci. 13(6), 685–691 (2008)

  16. Seo, S.H., Hwang, J.Y., Choi, K.Y., Lee, D.H.: Identity-based universal designated multi-verifiers signature schemes. Comput. Stand. Interfaces 30(5), 288–295 (2008)

    Article  Google Scholar 

  17. Yang, B., Xiao, Z., Yang, Y., Hu, Z., Niu, Z.: A strong multi-designated verifiers signature scheme. Front. Electr. Electron. Eng. China 3(2), 167–170 (2008)

    Article  Google Scholar 

  18. Vergnaud, D.: New extensions of pairing-based signatures into universal (multi) designated verifier signatures. Int. J. Found. Comput. Sci. 20(01), 109–133 (2009)

    Article  MathSciNet  Google Scholar 

  19. Chang, T.Y.: An ID-based multi-signer universal designated multi-verifier signature scheme. Inf. Comput. 209(7), 1007–1015 (2011)

    Article  MathSciNet  Google Scholar 

  20. Tian, H.: A new strong multiple designated verifiers signature for broadcast propagation. In: Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), IEEE, pp. 268–274 (2011)

  21. Tian, H.: A new strong multiple designated verifiers signature. Int. J. Grid Util. Comput. 3(1), 1–11 (2011)

    Google Scholar 

  22. Au, M.H., Yang, G., Susilo, W., Zhang, Y.: (Strong) multidesignated verifiers signatures secure against rogue key attack. Concurr. Comput. Pract. Exp. 26(8), 1574–1592 (2014)

    Article  Google Scholar 

  23. Deng, L., Zeng, J., Huang, H.: ID-based multi-signer universal designated multi-verifier signature based on discrete logarithm. Chiang Mai J. Sci. 45(1), 617–624 (2018)

    Google Scholar 

  24. Rastegari, P., Dakhilalian, M., Berenjkoub, M., Susilo, W.: Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model. IET Inf. Secur. 13(5), 459–468 (2019)

    Article  Google Scholar 

  25. Lipmaa, H., Wang, G., Bao, F.: Designated verifier signature schemes: attacks, new security notions and a new construction. In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, Proceedings, pp. 459–471 ( 2005)

  26. Shim, K.A.: On delegatability of designated verifier signature schemes. Inf. Sci. 281, 365–372 (2014)

    Article  MathSciNet  Google Scholar 

  27. Tian, H., Jiang, Z., Liu, Y. and Wei, B.: A non-delegatable strong designated verifier signature without random oracles. In: 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, IEEE, pp. 237–244 (2012)

  28. Huang, X., Susilo, W., Mu, Y. and Wu, W.: Universal designated verifier signature without delegatability. In: International Conference on Information and Communications Security, Springer, Berlin, pp. 479–498 (2006)

  29. Wang, B.: A non-delegatable identity-based strong designated verifier signature scheme. In: IACR Cryptology ePrint Archive, p 507 (2008)

  30. Huang, Q., Susilo, W., Wong, D.S.: Non-delegatable l. In: IACR Cryptology ePrint Archive vol. 367 (2009)

  31. Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. Int. J. Inf. Secur. 10(6), 373 (2011)

    Article  Google Scholar 

  32. Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Identity-based strong designated verifier signature revisited. J. Syst. Softw. 84(1), 120–129 (2011)

    Article  Google Scholar 

  33. Tian, H., Chen, X., Jiang, Z. and Du, Y.: Non-delegatable strong designated verifier signature on elliptic curves. In: International Conference on Information Security and Cryptology, Springer, Berlin, pp. 219–234 (2011)

  34. Asaar, M.R., Salmasizadeh, M.: A Non-delegatable identity-based designated verifier signature scheme without bilinear pairings. In: IACR Cryptology ePrint Archive, vol. 332 (2012)

  35. Tian, H., Chen, X., Zhang, F., Wei, B., Jiang, Z., Liu, Y.: A non-delegatable strong designated verifier signature in ID-based setting for mobile environment. Math. Comput. Model. 58(5–6), 1289–1300 (2013)

    Article  MathSciNet  Google Scholar 

  36. Tian, H., Li, J.: A short non-delegatable strong designated verifier signature. Front. Comput. Sci. 8(3), 490–502 (2014)

    Article  MathSciNet  Google Scholar 

  37. Rastegari, P., Berenjkoub, M., Dakhilalian, M., Susilo, W.: Universal designated verifier signature scheme with non-delegatability in the standard model. Inf. Sci. 479, 321–334 (2019)

    Article  MathSciNet  Google Scholar 

  38. Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: Annual International Cryptology Conference, Springer, Berlin, pp. 213–229 (2001)

  39. Waters, B. Efficient identity-based encryption without random oracles. In: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques Advances in cryptology–EUROCRYPT 2005, Aarhus, Denmark, Proceedings, pp. 114–127 (2005)

  40. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on Computer and communications Security, ACM, pp. 62–73 (1993)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Parvin Rastegari.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rastegari, P., Susilo, W. On delegatability of MDVS schemes. J Comput Virol Hack Tech 18, 71–80 (2022). https://doi.org/10.1007/s11416-021-00382-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-021-00382-2

Navigation