A Short Non-delegatable Strong Designated Verifier Signature

  • Haibo Tian
  • Xiaofeng Chen
  • Jin Li
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7372)


We propose a non-delegatable strong designated verifier signature (SDVS) featured by a two-element signature. Comparatively, current SDVS schemes without delegatability produce at least three-element signatures. The SDVS scheme provably satisfies the unforgeability property under a computational Diffie-Hellman (CDH) problem. Its non-delegatability holds conditioned on a knowledge extraction assumption (KEA). Its privacy of signer’s identity (PSI) is reduced to the hardness of a variant of CDH problem. The construction method utilizes a combination of a KEA-based identification protocol, an OR proof technique, and a Fiat-Shamir heuristic.


Signature Schemes Strong Designated Verifier Signature Non-delegatability 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bao, F., Deng, R.H., Zhu, H.: Variations of Diffie-Hellman Problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 301–312. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Cao, F., Cao, Z.: An identity based universal designated verifier signature scheme secure in the standard model. Journal of Systems and Software 82(4), 643–649 (2009)CrossRefGoogle Scholar
  4. 4.
    Cramer, R., Damgård, I.B., Schoenmakers, B.: Proof of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174–187. Springer, Heidelberg (1994)Google Scholar
  5. 5.
    Damgård, I.: Towards Practical Public Key Systems Secure against Chosen Ciphertext Attacks. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 445–456. Springer, Heidelberg (1992)Google Scholar
  6. 6.
    Dent, A.W., Galbraith, S.D.: Hidden Pairings and Trapdoor DDH Groups. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076, pp. 436–451. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. 7.
    Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)Google Scholar
  8. 8.
    Feng, D., Xu, J., Chen, W.: Generic Constructions for Strong Designated Verifier Signature. Journal of Information Processing Systems 7(1), 159–172 (2011)CrossRefGoogle Scholar
  9. 9.
    Huang, Q., Susil, W., Wong, D.: Non-delegatable Identity-based Designated Verifier Signature. Cryptology ePrint Archive: Report 2009/367 (2009)Google Scholar
  10. 10.
    Huang, Q., Yang, G., Wong, D., Susilo, W.: Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability. Cryptology ePrint Archive: Report 2009/518 (2009)Google Scholar
  11. 11.
    Huang, Q., Yang, G., Wong, D., Susilo, W.: Identity-based strong designated verifier signature revisited. Journal of Systems and Software 84(1), 120–129 (2011)CrossRefGoogle Scholar
  12. 12.
    Huang, X., Susilo, W., Mu, Y., Wu, W.: Universal Designated Verifier Signature Without Delegatability. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 479–498. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    Huang, X., Susilo, W., Mu, Y., Zhang, F.: Short Designated Verifier Signature Scheme and Its Identity-based Variant. International Journal of Network Security 6(1), 82–93 (2008)Google Scholar
  14. 14.
    Jakobsson, M., Sako, K., Impagliazzo, R.: Designated Verifier Proofs and Their Applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996)Google Scholar
  15. 15.
    Kancharla, P., Gummadidala, S., Saxena, A.: Identity Based Strong Designated Verifier Signature Scheme. Journal of Informatica 18(2), 239–252 (2007)MathSciNetzbMATHGoogle Scholar
  16. 16.
    Kang, B., Boyd, C., Dawson, E.: A novel identity based strong designated verifier signature scheme. Journal of Systems and Software 82(2), 270–273 (2009)CrossRefGoogle Scholar
  17. 17.
    Laguillaumie, F., Vergnaud, D.: Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 105–119. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  18. 18.
    Laguillaumie, F., Vergnaud, D.: Multi-designated Verifiers Signatures. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 495–507. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  19. 19.
    Lee, J., Chang, J.: Comment on Saeednia et al.’s strong designated verifier signature scheme. Journal of Computer Standards & Interfaces - CSI 31(1), 258–260 (2009)CrossRefGoogle Scholar
  20. 20.
    Li, Y., Lipmaa, H., Pei, D.: On Delegatability of Four Designated Verifier Signatures. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 61–71. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  21. 21.
    Lipmaa, H., Wang, G., Bao, F.: Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 459–471. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  22. 22.
    Möller, B.: Algorithms for Multi-exponentiation. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 165–180. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  23. 23.
    Ng, C., Susilo, W., Mu, Y.: Universal Designated Multi Verifier Signature Schemes. In: Xu, C., Yang, L. (eds.) SNDS 2005, pp. 305–309. IEEE, Fukuoka (2005)Google Scholar
  24. 24.
    Saeednia, S., Kramer, S., Markovitch, O.: An Efficient Strong Designated Verifier Signature Scheme. In: Lim, J.I., Lee, D.H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 40–54. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  25. 25.
    Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J.: Universal Designated-Verifier Signatures. In: Laih, C.S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 523–542. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  26. 26.
    Steinfeld, R., Wang, H., Pieprzyk, J.: Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 86–100. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  27. 27.
    Susilo, W., Zhang, F., Mu, Y.: Identity-Based Strong Designated Verifier Signature Schemes. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 313–324. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  28. 28.
    Sun, X., Li, J., Hu, Y., Chen, G.: Delegatability of an Identity Based Strong Designated Verifier Signature Scheme. INFORMATICA 21(1), 117–122 (2010)MathSciNetzbMATHGoogle Scholar
  29. 29.
    Tian, H., Chen, X., Jiang, Z., Du, Y.: Non-delegatable Strong Designated Verier Signature on Elliptic Curves. In: ICISC 2011, Seoul, Korea (November 2011)Google Scholar
  30. 30.
    Wang, B.: A non-delegatable identity-based strong designated verifier signature scheme. Cryptology ePrint Archive: Report /2008/507 (2008)Google Scholar
  31. 31.
    Wu, J., Stinson, D.: An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption. Cryptology ePrint Archive: Report 2007/479 (2007)Google Scholar
  32. 32.
    Zhang, R., Furukawa, J., Imai, H.: Short Signature and Universal Designated Verifier Signature Without Random Oracles. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 483–498. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  33. 33.
    Zhang, J., Geng, Q.: On the Security of Group Signature Scheme and Designated Verifier Signature Scheme. In: NAS 2008, pp. 351–358. IEEE, Chongqing (2008)Google Scholar
  34. 34.
    Zhang, J., Mao, J.: A novel ID-based designated verifier signature scheme. Information Sciences 178(3), 766–773 (2008)MathSciNetzbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Haibo Tian
    • 1
  • Xiaofeng Chen
    • 2
  • Jin Li
    • 3
  1. 1.School of Information Science and TechnologySun Yat-Sen UniversityGuangzhouP.R. China
  2. 2.State Key Laboratory of Integrated Service Networks (ISN)Xidian UniversityXi’anP.R. China
  3. 3.School of Computer ScienceGuangzhou UniversityP.R. China

Personalised recommendations