Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Secure universal designated verifier identity-based signcryption

Published: 01 February 2014 Publication History

Abstract

In 2003, Steinfeld et al. introduced the notion of universal designated verifier signature UDVS, which allows a signature holder, who receives a signature from the signer, to convince a designated verifier whether he is possession of a signer's signature; at the same time, the verifier cannot transfer such conviction to anyone else. These signatures devote to protect the receiver's privacy, that is, the receiver may want to prove to any designated verifier who he is in possession of such signature signed by the known signer but reluctant to disclose it. Moreover, the receiver also does not want the verifier to be able to convince anyone that he is in possession of such signature. In the existing UDVS schemes, a secure channel is required between the signer and the signature holder to transfer the signature. This paper, for the first time, proposes the notion of universal designated verifier signcryption without this secure channel by combining the notions of UDVS and signcryption. We give the formal definitions and a concrete construction of universal designated verifier identity-based signcryption scheme. We also give the formal security proofs for our scheme under the random oracle model. Copyright © 2013 John Wiley & Sons, Ltd.

References

[1]
Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications. In Advances in Cryptology-Eurocrypt'96, vol.Volume 1070, LNCS. Springer-Verlag: Saragossa, Spain, 1996.
[2]
Steinfeld R, Bull L, Wang H, Pieprzyk J. Universal designated-verifier signatures. In Advances in Cryptology-Asiacrypt'03, vol.Volume 2894, LNCS. Springer-Verlag: Taipei, Taiwan, 2003; pp.523-542.
[3]
Huang X, Susilo W, Mu Y, Zhang F. Short identity-based strong designated verifier signature scheme. In Proceedings of ISPEC'06, vol.Volume 3903, LNCS. Springer-Verlag: Hangzhou, China, 2006; pp.214-225.
[4]
Zheng Y. Digital signcryption or how to achieve costSignature & Encryption<
[5]
Shamir A. Identity-based cryptosystems and signature schemes. In Advances in Cryptology-Crypto'84, vol.Volume 196, LNCS, Springer-Verlag: Santa Barbara, California, 1985; pp.47-53.
[6]
Chen L, Lee J. Improved identity-based signcryption. In Public Key Cryptography-PKC'05, vol.Volume 3386, LNCS. Springer-Verlag: Les Diablerets, Switzerland, 2005; pp.362-379.
[7]
Steinfeld R, Wang H, Pieprzyk J. Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. In Public Key Cryptography-PKC'04, vol.Volume 3089, LNCS. Springer-Verlag: Singapore, 2004; pp.86-100.
[8]
Ng CY, Susilo W, Mu Y. Universal designated multi verifier signature schemes, Proceedings of the 2005 11th International Conference on Parallel and Distributed Systems , Fukuoka, Japan. IEEE Press, 2005; pp.305-309.
[9]
Shahandashti SF, Safavi-Naini R. Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures. IET Information security 2009; Volume 3 Issue 4: pp.152-176.
[10]
Zhang R, Furukawa J, Imai H. Short signature and universal designated verifier signature without random oracles. In Proceedings of ACNS'05, vol.Volume 3531, LNCS, Springer-Verlag: New York, USA, 2005; pp.483-498.
[11]
Boneh D, Boyen X. Short signatures without random oracles. In Advances in Cryptology-Eurocrypt'04, vol.Volume 3027, LNCS. Springer-Verlag: Interlaken, Switzerland, 2004; pp.514-532.
[12]
Laguillaumie F, Libert B, Quisquater J. Universal designated verifier signatures without random oracles or non-black box assumptions. In Proceedings of the Fifth Conference on Security and Cryptography for Networks, vol.Volume 4116, LNCS. Springer-Verlag: Maiori, Italy, 2006; pp.63-77.
[13]
Huang X, Susilo W, Mu Y, Wu W. Secure universal designated verifier signature without random oracles. International Journal of Information Security 2008; Volume 7: pp.171-183.
[14]
Vergnaud D. New extensions of pairing-based signatures into universal multi designated verifier signatures. In Proceedings of 33rd International Colloquium on Automata, Languages and Programming-ICALP'06, vol.Volume 4052, LNCS. Springer-Verlag: Venice, Italy, 2006; pp.58-69.
[15]
Zhang F, Susilo W, Mu Y, Chen X. Identity-based universal designated verifier signatures. In Proceedings of EUC Workshops'05, vol.Volume 3823, LNCS. Springer-Verlag: Nagasaki, Japan, 2005; pp.825-834.
[16]
Cao F, Cao Z. An identity based universal designated verifier signature scheme secure in the standard model. Journal of Systems and Software 2009; Volume 82: pp.643-649.
[17]
Waters B. Efficient identity-based encryption without random oracles. In Advances in Cryptology-Eurocrypt'05, vol.Volume 3494, LNCS. Springer-Verlag: Aarhus, Denmark, 2005; pp.114-127.
[18]
Seo SH, Hwang JY, Choi KY, Lee DH. Identity-based universal designated multi-verifiers signature schemes. Computer Standards and Interfaces 2008; Volume 30: pp.288-295.
[19]
Baek J, Safavi-Naini R, Susilo W. Universal designated verifier signature proof or how to efficiently prove knowledge of a signature. In Advances in Cryptology-Asiacrypt'05, vol.Volume 3788, LNCS, Springer-Verlag: Aarhus, Denmark, 2005; pp.644-661.
[20]
Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In Advances in Cryptology-Asiacrypt'01, vol.Volume 2248, LNCS. Springer-Verlag: Gold Coast, Australia, 2001; pp.566-582.
[21]
Chen X, Chen G, Zhang F, Wei B, Mu Y. Identity-based universal designated verifier signature proof system. International Journal of Network Security 2009; Volume 8 Issue 1: pp.52-58.
[22]
Li Y, Pang L, Wang Y. Attacks on a universal designated verifier signature scheme, In the Fifth International Conference on Information Assurance and Security , Xi'an, China. IEEE Press, 2009; pp.27-30.
[23]
Huang X, Susilo W, Mu Y, Zhang F. Restricted universal designated verifier signature. In Proceedings of UIC'06, vol.Volume 4159, LNCS, Springer-Verlag: Wuhan and Three Gorges, China, 2006; pp.874-882.
[24]
Laguillaumie F, Vergnaud D. On the soundness of restricted universal designated verifier signature and dedicated signatures. In Proceedings of ISC'07, vol.Volume 4779, LNCS. Springer-Verlag: Valparaíso, Chile, 2007; pp.175-188.
[25]
Huang X, Susilo W, Mu Y, Wu W. Universal designated verifier signature without delegatability. In Proceedings of ICICS'06, vol.Volume 4307, LNCS. Springer-Verlag: Raleigh, NC, USA, 2006; pp.478-498.
[26]
Chang T. An ID-based multi-signer universal designated multi-verifier signature scheme. Information and Computation 2011; Volume 209: pp.1007-1015.
[27]
Li J, Wang Y. Universal designated verifier ring signature proof without random oracles. In Proceedings of EUC Workshops'06, vol.Volume 4097, LNCS. Springer-Verlag: Seoul, Korea, 2006; pp.332-341.
[28]
Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In Advances in Cryptology-Crypto'01, vol.Volume 2139, LNCS, Springer-Verlag: Santa Barbara, California, 2001; pp.213-229.
[29]
Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. Journal of Cryptology 2000; Volume 13: pp.361-369.

Cited By

View all
  • (2018)Identity-based deniable authenticated encryption and its application to e-mail systemTelecommunications Systems10.1007/s11235-015-0099-162:4(625-639)Online publication date: 30-Dec-2018
  • (2016)Revocable and strongly unforgeable identity-based signature scheme in the standard modelSecurity and Communication Networks10.1002/sec.15139:14(2422-2433)Online publication date: 25-Sep-2016

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Security and Communication Networks
Security and Communication Networks  Volume 7, Issue 2
February 2014
228 pages
ISSN:1939-0114
EISSN:1939-0122
Issue’s Table of Contents

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 01 February 2014

Author Tags

  1. identity-based cryptography
  2. random oracle model
  3. signcryption scheme
  4. universal designated verifier

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Identity-based deniable authenticated encryption and its application to e-mail systemTelecommunications Systems10.1007/s11235-015-0099-162:4(625-639)Online publication date: 30-Dec-2018
  • (2016)Revocable and strongly unforgeable identity-based signature scheme in the standard modelSecurity and Communication Networks10.1002/sec.15139:14(2422-2433)Online publication date: 25-Sep-2016

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media