Advertisement

Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model

  • Parvin Rastegari
  • Willy SusiloEmail author
  • Mohammad Dakhilalian
Regular Contribution
  • 19 Downloads

Abstract

In a designated verifier signature (DVS) scheme, the signer (Alice) creates a signature which is only verifiable by a designated verifier (Bob). Furthermore, Bob cannot convince any third party that the signature was produced by Alice. A DVS scheme is applicable in scenarios where Alice must be authenticated to Bob without disturbing her privacy. The de-facto construction of DVS scheme is achieved in a traditional public key infrastructure (PKI) setting, which unfortunately requires a high-cost certificate management. A variant of identity-based (ID-based) setting DVS eliminates the need of certificates, but it introduces a new inherent key escrow problem, which makes it impractical. Certificateless public key cryptography (CL-PKC) is empowered to overcome the problems of PKI and ID-based settings, where it does not suffer from any of the aforementioned problems. However, only a few number of certificateless DVS (CL-DVS) schemes have been proposed in the literature to date. Moreover, all existing CL-DVS schemes are only proven secure in the random oracle model, while some of them are already known to be insecure. We provide three contributions in this paper. First, we revisit the security proofs of existing CL-DVS schemes in the literature and show that unfortunately there are some drawbacks in the proofs of all of those schemes. Second, we concentrate on the recently proposed CL-DVS scheme (IEEE Access 2018) and show a drawback in its security proof which makes it unreliable. Furthermore, we show that this scheme is delegatable in contrast to the author’s claim. Finally, we propose a CL-DVS scheme and prove its security requirements in the standard model. Our scheme is not only the first scheme with a complete and correct security proofs, but also the only scheme in the standard model.

Keywords

Designated verifier signature Certificateless public key cryptography Certificateless designated verifier signature Standard model Random oracle model 

Notes

Compliance with ethical standards

Conflict of interest

Authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

References

  1. 1.
    Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Chaum, D., Antwerpen, H.V.: Undeniable signatures. In Advances in Cryptology, CRYPTO’89 Proceedings, pp. 212–216. Springer, New York (1989)Google Scholar
  3. 3.
    Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In Advances in Cryptology, EUROCRYPT’96, pp. 143–154. Springer, Berlin (1996)Google Scholar
  4. 4.
    Chaum, D.: Private signature and proof systems, U.S. Patent 5,493,614Google Scholar
  5. 5.
    Wang, D., Wang, P.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. 15(4), 708–722 (2018)Google Scholar
  6. 6.
    Wang, D., Wang, N., Wang, P., Qing, S.: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321, 162–178 (2015)CrossRefzbMATHGoogle Scholar
  7. 7.
    Shamir, A.: Identity-based cryptosystem and signature scheme. In: Advances in Cryptology, Crypto 84. Springer, LNCS, vol. 196, pp. 47–53 (1984)Google Scholar
  8. 8.
    Al-Riyami, S.S., Paterson, K.: Certificateless public key cryptography. In: Asiacrypt 2003, Springer, LNCS , vol. 2894, pp. 452–473 (2003)Google Scholar
  9. 9.
    Huang, X., Susilo, W., Mu, Y., Zhang F.: Certificateless designated verifier signature schemes. In: 20th International Conference on Advanced Information Networking and Applications (AINA’06), Vienna, Australia, pp. 15–19 (2006)Google Scholar
  10. 10.
    Chen, H., Song, R., Zhang, F., Song, F.: An efficient certificateless short designated verifier signature scheme. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM’08), Dalian, China, pp. 1–6 (2008)Google Scholar
  11. 11.
    Du, H., Wen, Q.: Efficient certificateless designated verifier signatures and proxy signatures. Chin. J. Electron. 18(1), 95–100 (2009)Google Scholar
  12. 12.
    Yang, B., Hu, Z., Xiao, Z.: Efficient certificateless strong designated verifier signature scheme. In: International Conference on Computational Intelligence and Security (CIS’09), Beijing, China, vol. 1, pp. 432–436 (2009)Google Scholar
  13. 13.
    Xiao, Z., Yang, B., Li, S.: Certificateless strong designated verifier signature scheme. In: 2nd International Conference on e-Business and Information System Security (EBISS), pp. 1–5. IEEE (2010)Google Scholar
  14. 14.
    Islam, S.H., Biswas, G.P.: Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings. J. King Saud Univ. Comput. Inf. Sci. 25(1), 51–61 (2013)Google Scholar
  15. 15.
    He, D., Chen, J.: An efficient certificateless designated verifier signature scheme. Int. Arab J. Inf. Technol. 10(4), 389–396 (2013)Google Scholar
  16. 16.
    Chen, Y., Zhao, Y., Xiong, H., Yue, F.: A certificateless strong designated verifier signature scheme with non-delegatability. IJ Netw. Secur. 19(4), 573–582 (2017)Google Scholar
  17. 17.
    Lin, H.Y.: A new certificateless strong designated verifier signature scheme: non-delegatable and SSA-KCA secure. IEEE Access 6, 50765–50775 (2018)CrossRefGoogle Scholar
  18. 18.
    Pakniat, N.: On the security of a certificateless strong designated verifier signature scheme. IACR Cryptology ePrint Archive (2018)Google Scholar
  19. 19.
    Au, M.H., Mu, Y., Chen, J., Wong, D.S., Liu, J.K., Yang, G.: Malicious KGC attacks in certificateless cryptography. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security, ACM, pp. 302–311 (2007)Google Scholar
  20. 20.
    Liu, T., Wang, X., Ding, X.: security analysis and improvement of certificateless strong designated verifier signature scheme. Comput. Sci. 40(7), 126–128 (2013). (in chinese) Google Scholar
  21. 21.
    Lin, H.Y., Ting, P.Y., Yang, L.F.: On the security of a provably secure certificateless strong designated verifier signature scheme based on bilinear pairings. ICTCE, pp. 61–65 (2017)Google Scholar
  22. 22.
    Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, ACM, pp. 62–73 (1993)Google Scholar
  23. 23.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in CryptologyCRYPTO 2001, Springer, Berlin, pp. 213–229 (2001)Google Scholar
  24. 24.
    Gentry, C., Halevi, S.: Hierarchical identity based encryption with polynomially many levels. In: Theory of Cryptography Conference, pp. 437–456. Springer, Berlin (2009)Google Scholar
  25. 25.
    Li, Y., Lipmaa, H., Pei, D.: On delegatability of four designated verifier signatures. ICICS 3783, 61–71 (2005)MathSciNetzbMATHGoogle Scholar
  26. 26.
    Tian, H., Jiang, Z., Liu, Y., Wei, B.: A non-delegatable strong designated verifier signature without random oracles. In: 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS), IEEE, pp. 237–244 (2012)Google Scholar
  27. 27.
    Dent, A.W.: A survey of certificateless encryption schemes and security models. Int. J. Inf. Secur. 7(5), 349–377 (2008)CrossRefGoogle Scholar
  28. 28.
    Yuan, Y., Wang, C.: Certificateless signature scheme with security enhanced in the standard model. Inf. Process. Lett. 114(9), 492–499 (2014)MathSciNetCrossRefzbMATHGoogle Scholar
  29. 29.
    Waters, B.: Efficient identity-based encryption without random oracles. In: Eurocrypt’05 3494 , pp. 114–127 (2005)Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Electrical and Computer EngineeringIsfahan University of TechnologyIsfahanIran
  2. 2.Institute of Cybersecurity and Cryptology, School of Computing and Information TechnologyUniversity of WollongongWollongongAustralia

Personalised recommendations