Abstract
In a designated verifier signature (DVS) scheme, a signer (Alice) generates a signature which can only be verified by a designated verifier (Bob) chosen by her. Moreover, Bob cannot transfer his conviction about Alice’s signature to any third party. A DVS scheme provides the capability of authenticating Alice to Bob without disrupting her privacy. A multi designated verifier signature (MDVS) scheme is an extension of a DVS which consists of multiple designated verifiers. Non-delegatability is an essential property of a DVS scheme in scenarios where the responsibility of a signer (Alice) is important and she must not be able to delegate the signing rights to another entity. In this paper, we discuss on all MDVS schemes proposed up to now (to the best of our knowledge) and show that all of them are delegatable. As a result, proposing a non-delegatable MDVS scheme is an open research problem in the literature.
Similar content being viewed by others
References
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Chaum, D., Van Antwerpen, H.: Undeniable signatures, In: Conference on the Theory and Application of Cryptology, Springer, New York, pp. 212–216 (1989)
Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, pp. 143–154 (1996)
Chaum, D.: Private signature and proof systems, U.S. Patent 5493614 (1996)
Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J.: Universal designated-verifier signatures. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, Heidelberg, pp. 523–542 (2003)
Desmedt, Y.: Verifier-designated signatures, Rump session. Crypto 3 (2003)
Laguillaumie, F., Vergnaud, D.: Multi-designated verifiers signatures, In: International Conference on Information and Communications Security, Springer, Berlin, Heidelberg, pp. 495–507 (2004)
Ng, C. Y., Susilo, W., Mu, Y.: Universal designated multi verifier signature schemes. In: Proceedings 11th International Conference on Parallel and Distributed Systems, IEEE, vol. 2, pp. 305–309 (2005)
Shailaja, G., Kumar, K.P., Saxena, A.: Universal designated multi verifier signature without random oracles. In: 9th International Conference on Information Technology, ICIT’06, IEEE, pp. 168–171 (2006)
Chow, S.S.: Identity-based strong multi-designated verifiers signatures. In: European Public Key Infrastructure Workshop, Springer, Berlin, pp. 257–259 (2006)
Ng, C.Y., Susilo, W., Mu, Y.: Designated group credentials, In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ACM, pp. 59–65 (2006)
Laguillaumie, F., Vergnaud, D.: Multi-designated verifiers signatures: anonymity without encryption. Inf. Process.Lett. 102(2–3), 127–132 (2007)
Li, Y., Susilo, W., Mu, Y., Pei, D.: Designated verifier signature: definition, framework and new constructions. In: International Conference on Ubiquitous Intelligence and Computing, Springer, Berlin, pp. 1191–1200 (2007)
Chow, S.S.: Multi-designated verifiers signatures revisited. IJ Netw. Secur. 7(3), 348–357 (2008)
Yang, M., Yumin, W.: Universal designated multi verifier signature scheme without random oracles. Wuhan Univ. J. Nat. Sci. 13(6), 685–691 (2008)
Seo, S.H., Hwang, J.Y., Choi, K.Y., Lee, D.H.: Identity-based universal designated multi-verifiers signature schemes. Comput. Stand. Interfaces 30(5), 288–295 (2008)
Yang, B., Xiao, Z., Yang, Y., Hu, Z., Niu, Z.: A strong multi-designated verifiers signature scheme. Front. Electr. Electron. Eng. China 3(2), 167–170 (2008)
Vergnaud, D.: New extensions of pairing-based signatures into universal (multi) designated verifier signatures. Int. J. Found. Comput. Sci. 20(01), 109–133 (2009)
Chang, T.Y.: An ID-based multi-signer universal designated multi-verifier signature scheme. Inf. Comput. 209(7), 1007–1015 (2011)
Tian, H.: A new strong multiple designated verifiers signature for broadcast propagation. In: Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), IEEE, pp. 268–274 (2011)
Tian, H.: A new strong multiple designated verifiers signature. Int. J. Grid Util. Comput. 3(1), 1–11 (2011)
Au, M.H., Yang, G., Susilo, W., Zhang, Y.: (Strong) multidesignated verifiers signatures secure against rogue key attack. Concurr. Comput. Pract. Exp. 26(8), 1574–1592 (2014)
Deng, L., Zeng, J., Huang, H.: ID-based multi-signer universal designated multi-verifier signature based on discrete logarithm. Chiang Mai J. Sci. 45(1), 617–624 (2018)
Rastegari, P., Dakhilalian, M., Berenjkoub, M., Susilo, W.: Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model. IET Inf. Secur. 13(5), 459–468 (2019)
Lipmaa, H., Wang, G., Bao, F.: Designated verifier signature schemes: attacks, new security notions and a new construction. In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, Proceedings, pp. 459–471 ( 2005)
Shim, K.A.: On delegatability of designated verifier signature schemes. Inf. Sci. 281, 365–372 (2014)
Tian, H., Jiang, Z., Liu, Y. and Wei, B.: A non-delegatable strong designated verifier signature without random oracles. In: 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, IEEE, pp. 237–244 (2012)
Huang, X., Susilo, W., Mu, Y. and Wu, W.: Universal designated verifier signature without delegatability. In: International Conference on Information and Communications Security, Springer, Berlin, pp. 479–498 (2006)
Wang, B.: A non-delegatable identity-based strong designated verifier signature scheme. In: IACR Cryptology ePrint Archive, p 507 (2008)
Huang, Q., Susilo, W., Wong, D.S.: Non-delegatable l. In: IACR Cryptology ePrint Archive vol. 367 (2009)
Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. Int. J. Inf. Secur. 10(6), 373 (2011)
Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Identity-based strong designated verifier signature revisited. J. Syst. Softw. 84(1), 120–129 (2011)
Tian, H., Chen, X., Jiang, Z. and Du, Y.: Non-delegatable strong designated verifier signature on elliptic curves. In: International Conference on Information Security and Cryptology, Springer, Berlin, pp. 219–234 (2011)
Asaar, M.R., Salmasizadeh, M.: A Non-delegatable identity-based designated verifier signature scheme without bilinear pairings. In: IACR Cryptology ePrint Archive, vol. 332 (2012)
Tian, H., Chen, X., Zhang, F., Wei, B., Jiang, Z., Liu, Y.: A non-delegatable strong designated verifier signature in ID-based setting for mobile environment. Math. Comput. Model. 58(5–6), 1289–1300 (2013)
Tian, H., Li, J.: A short non-delegatable strong designated verifier signature. Front. Comput. Sci. 8(3), 490–502 (2014)
Rastegari, P., Berenjkoub, M., Dakhilalian, M., Susilo, W.: Universal designated verifier signature scheme with non-delegatability in the standard model. Inf. Sci. 479, 321–334 (2019)
Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: Annual International Cryptology Conference, Springer, Berlin, pp. 213–229 (2001)
Waters, B. Efficient identity-based encryption without random oracles. In: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques Advances in cryptology–EUROCRYPT 2005, Aarhus, Denmark, Proceedings, pp. 114–127 (2005)
Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on Computer and communications Security, ACM, pp. 62–73 (1993)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Rastegari, P., Susilo, W. On delegatability of MDVS schemes. J Comput Virol Hack Tech 18, 71–80 (2022). https://doi.org/10.1007/s11416-021-00382-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-021-00382-2