http://iet.metastore.ingenta.com
1887

Short and provably secure designated verifier proxy signature scheme

Short and provably secure designated verifier proxy signature scheme

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

A designated verifier proxy signature (DVPS), where only a designated verifier can verify the validity of a proxy signed message, is suitable for being applied in many scenarios. Many DVPS schemes have been proposed, but most of these schemes only provide informal proofs of security or incomplete formal proofs of security with limited power attackers (a weak security model), which make these schemes vulnerable to some attacks. To the best of their knowledge, none of the existing DVPS schemes provides a complete notion of security for DVPS. In this study, the authors first classify DVPS into weak DVPS (WDVPS) and strong DVPS (SDVPS). They then give a systematic analysis of the security requirements for WDVPS (SDVPS) and they present complete notions of security for WDVPS and SDVPS. They also propose WDVPS and SDVPS schemes, which are both provably secure, that is, satisfying their new notions of security in the random oracle model. Compared with other DVPS schemes (including WDVPS and SDVPS schemes), their schemes have more complete security and they are more efficient.

References

    1. 1)
      • 1. Mambo, M., Usuda, K., Okamoto, E.: ‘Proxy signatures: delegation of the power to sign messages’, IEICE Trans. Fundam., 1996, E79-A, (9), pp. 13381354.
    2. 2)
      • 2. Wang, B.: ‘A new identity based proxy signature scheme’ (Cryptology ePrint Archive, 2008), pp. 122. Available at: http://www.eprint.iacr.org/2008/323.
    3. 3)
      • 3. Schdult, J.C.N., Matsuura, K., Paterson, K.G.: ‘Proxy signatures secure against proxy key exposure’. Proc. PKC 2008, 2008 (LNCS, 4939), pp. 344359.
    4. 4)
      • 4. Jakobsson, M., Sako, K., Impagliazzo, R.: ‘Designated verifier proofs and their applications’. Proc. Cryptology-EUROCRYPT 1996, 1996 (LNCS, 1070), pp. 143154.
    5. 5)
      • 5. Asaar, M.R., Salmasizadeh, M.: ‘A pairing based strong designated verifier signature scheme without random oracles’ (Cryptology ePrint Archive, 2012), pp. 114. Available at: http://www.epring.iacr.org/2012/061.
    6. 6)
    7. 7)
      • 7. Tian, H., Jiang, Z., Liu, Y., Wei, B.: ‘A non-delegatable strong designated verifier signature without random oracles’. Proc. INCOS 2012, 2012, pp. 237244.
    8. 8)
      • 8. Si, G., Xin, X., Chen, Y., Xiao, G.: ‘Short signature for specified verifier’, Acta Electron. Sin., 2008, 36, (1), pp. 2427.
    9. 9)
    10. 10)
      • 10. Liao, Y.: ‘Study on the designated verifier signature’. PhD thesis, Zhejiang University, 2007.
    11. 11)
      • 11. Wang, G.: ‘Designated-receiver proxy signatures for e-commerce’. Proc. ICME 2004, 2004, pp. 17311734.
    12. 12)
      • 12. Dai, J., Yang, X., Dong, J.: ‘Designated-receiver proxy signature scheme for electronic commerce’. Proc. Systems, Man and Cybernetics 2003, 2003, pp. 384389.
    13. 13)
      • 13. Zhang, B., Xu, Q.: ‘A strong designated-verifier proxy signature scheme’. Proc. WKDD 2009, 2009, pp. 569572.
    14. 14)
      • 14. Zhang, X., Huang, S., Xin, X.: ‘Improved proxy signature for designated verifier’. Proc. NCIS 2011, 2011, pp. 231233.
    15. 15)
    16. 16)
      • 16. Islam, H.S.K., Biswas, G.P.: ‘Design of an efficient id-based short designated verifier proxy signature scheme’. Proc. RAIT 2012, 2012, pp. 4853.
    17. 17)
      • 17. Lu, R., Cao, Z., Dong, X., Sue, R.: ‘Designated verifier proxy signature scheme from bilinear pairings’. Proc. IMSCCS 2006, 2006, pp. 4047.
    18. 18)
      • 18. Liao, Y., Lu, Q., Qin, Z.: ‘Designated verifier proxy signature scheme’. Proc. IIH-MSP 2008, 2008, pp. 235238.
    19. 19)
      • 19. Waters, B.: ‘Efficient identity based encryption without random oracles’. Proc. Cryptology-EUROCRYPT 2005, 2005 (LNCS, 3494), pp. 114127.
    20. 20)
    21. 21)
      • 21. Kang, B.: ‘Attacks on one designated verifier proxy signature scheme’, J. Appl. Math., 2012, 6, (2012), pp. 16.
    22. 22)
      • 22. Lin, H., Wu, T., Huang, S.: ‘An efficient strong designated verifier proxy signature scheme for electronic commerce’, J. Inf. Sci. Eng., 2012, 28, (4), pp. 771785.
    23. 23)
    24. 24)
    25. 25)
      • 25. Islam, S.K., Biswas, G.: ‘A provably secure identity based strong designated verifier proxy signature scheme from bilinear pairings’, J. King Saud Univ., Comput. Inf. Sci., 2014, 26, (1), pp. 5567.
    26. 26)
      • 26. KUL: ‘D.MAYA.6 final report on main computational assumptions in cryptography, ICT-2007-216676 ECRYPT II European network of excellence in cryptology II’ (Katholieke Universiteit Leuven, Spain, 2010), pp. 165.
    27. 27)
      • 27. Bao, F., Robert, H.D., Zhu, H.: ‘Variations of Diffie–Hellman problem’. Proc. ICICS 2003, 2003 (LNCS, 2836), pp. 301312.
    28. 28)
      • 28. Prabhakaran, M., Xue, R.: ‘Statistically hiding sets’. Proc. Topics in Cryptology-CT-RSA 2009, 2009 (LNCS, 5473), pp. 100116.
    29. 29)
      • 29. Bellare, M., Palacio, A.: ‘The knowledge of exponent assumptions and 3-round zero knowledge protocols’. Proc. Cryptology-CRYPTO 2004, 2004 (LNCS, 3152), pp. 273289.
    30. 30)
      • 30. Laguillaumie, F., Vergnaud, D.: ‘Designated verifier signatures anonymity and efficient construction from any bilinear map’. Proc. SCN 2004, 2004 (LNCS, 3352), pp. 105119.
    31. 31)
      • 31. Lipmaa, H., Wang, G., Bao, F.: ‘Designated verifier signature schemes: attacks, new security notions and a new construction’. Proc. ICALP 2005, 2005 (LNCS, 3580), pp. 459471.
    32. 32)
      • 32. Saeednia, S., Kremer, S., Markowitch, O.: ‘An efficient strong designated verifier signature scheme’. Proc. Cryptology-ICISC 2003, 2003 (LNCS, 2971), pp. 4054.
    33. 33)
      • 33. Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J.: ‘Universal designated-verifier signatures’. Proc. Cryptology-ASIACRYPT 2003, 2003 (LNCS, 2894), pp. 523542.
    34. 34)
      • 34. Steinfeld, R., Wang, H., Pieprzyk, J.: ‘Efficient extension of standard schnorr/RSA signatures into universal designated-verifier signatures’. Proc. PKC 2004, 2004 (LNCS, 2947), pp. 86100.
    35. 35)
      • 35. Lee, B., Kim, H., Kim, K.: ‘Strong proxy signature and its applications’. Proc. SCIS 2001, 2001, pp. 603608.
    36. 36)
      • 36. Lee, B., Kim, H., Kim, K.: ‘Secure mobile agent using strong non-designated proxy signature’. Proc. ACISP 2001, 2001 (LNCS, 2119), pp. 474486.
    37. 37)
      • 37. Boneh, D., Lynn, B., Shacham, H.: ‘Short signatures from the Weil pairing’. Proc. Cryptology-ASIACRYPT 2001, 2001 (LNCS, 2248), pp. 514532.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2014.0434
Loading

Related content

content/journals/10.1049/iet-ifs.2014.0434
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address