Skip to main content
Log in

Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

In a designated verifier signature (DVS) scheme, the signer (Alice) creates a signature which is only verifiable by a designated verifier (Bob). Furthermore, Bob cannot convince any third party that the signature was produced by Alice. A DVS scheme is applicable in scenarios where Alice must be authenticated to Bob without disturbing her privacy. The de-facto construction of DVS scheme is achieved in a traditional public key infrastructure (PKI) setting, which unfortunately requires a high-cost certificate management. A variant of identity-based (ID-based) setting DVS eliminates the need of certificates, but it introduces a new inherent key escrow problem, which makes it impractical. Certificateless public key cryptography (CL-PKC) is empowered to overcome the problems of PKI and ID-based settings, where it does not suffer from any of the aforementioned problems. However, only a few number of certificateless DVS (CL-DVS) schemes have been proposed in the literature to date. Moreover, all existing CL-DVS schemes are only proven secure in the random oracle model, while some of them are already known to be insecure. We provide three contributions in this paper. First, we revisit the security proofs of existing CL-DVS schemes in the literature and show that unfortunately there are some drawbacks in the proofs of all of those schemes. Second, we concentrate on the recently proposed CL-DVS scheme (IEEE Access 2018) and show a drawback in its security proof which makes it unreliable. Furthermore, we show that this scheme is delegatable in contrast to the author’s claim. Finally, we propose a CL-DVS scheme and prove its security requirements in the standard model. Our scheme is not only the first scheme with a complete and correct security proofs, but also the only scheme in the standard model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  2. Chaum, D., Antwerpen, H.V.: Undeniable signatures. In Advances in Cryptology, CRYPTO’89 Proceedings, pp. 212–216. Springer, New York (1989)

  3. Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In Advances in Cryptology, EUROCRYPT’96, pp. 143–154. Springer, Berlin (1996)

  4. Chaum, D.: Private signature and proof systems, U.S. Patent 5,493,614

  5. Wang, D., Wang, P.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. 15(4), 708–722 (2018)

    Google Scholar 

  6. Wang, D., Wang, N., Wang, P., Qing, S.: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321, 162–178 (2015)

    Article  MATH  Google Scholar 

  7. Shamir, A.: Identity-based cryptosystem and signature scheme. In: Advances in Cryptology, Crypto 84. Springer, LNCS, vol. 196, pp. 47–53 (1984)

  8. Al-Riyami, S.S., Paterson, K.: Certificateless public key cryptography. In: Asiacrypt 2003, Springer, LNCS , vol. 2894, pp. 452–473 (2003)

  9. Huang, X., Susilo, W., Mu, Y., Zhang F.: Certificateless designated verifier signature schemes. In: 20th International Conference on Advanced Information Networking and Applications (AINA’06), Vienna, Australia, pp. 15–19 (2006)

  10. Chen, H., Song, R., Zhang, F., Song, F.: An efficient certificateless short designated verifier signature scheme. In: 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM’08), Dalian, China, pp. 1–6 (2008)

  11. Du, H., Wen, Q.: Efficient certificateless designated verifier signatures and proxy signatures. Chin. J. Electron. 18(1), 95–100 (2009)

    Google Scholar 

  12. Yang, B., Hu, Z., Xiao, Z.: Efficient certificateless strong designated verifier signature scheme. In: International Conference on Computational Intelligence and Security (CIS’09), Beijing, China, vol. 1, pp. 432–436 (2009)

  13. Xiao, Z., Yang, B., Li, S.: Certificateless strong designated verifier signature scheme. In: 2nd International Conference on e-Business and Information System Security (EBISS), pp. 1–5. IEEE (2010)

  14. Islam, S.H., Biswas, G.P.: Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings. J. King Saud Univ. Comput. Inf. Sci. 25(1), 51–61 (2013)

    Google Scholar 

  15. He, D., Chen, J.: An efficient certificateless designated verifier signature scheme. Int. Arab J. Inf. Technol. 10(4), 389–396 (2013)

    Google Scholar 

  16. Chen, Y., Zhao, Y., Xiong, H., Yue, F.: A certificateless strong designated verifier signature scheme with non-delegatability. IJ Netw. Secur. 19(4), 573–582 (2017)

    Google Scholar 

  17. Lin, H.Y.: A new certificateless strong designated verifier signature scheme: non-delegatable and SSA-KCA secure. IEEE Access 6, 50765–50775 (2018)

    Article  Google Scholar 

  18. Pakniat, N.: On the security of a certificateless strong designated verifier signature scheme. IACR Cryptology ePrint Archive (2018)

  19. Au, M.H., Mu, Y., Chen, J., Wong, D.S., Liu, J.K., Yang, G.: Malicious KGC attacks in certificateless cryptography. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security, ACM, pp. 302–311 (2007)

  20. Liu, T., Wang, X., Ding, X.: security analysis and improvement of certificateless strong designated verifier signature scheme. Comput. Sci. 40(7), 126–128 (2013). (in chinese)

    Google Scholar 

  21. Lin, H.Y., Ting, P.Y., Yang, L.F.: On the security of a provably secure certificateless strong designated verifier signature scheme based on bilinear pairings. ICTCE, pp. 61–65 (2017)

  22. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, ACM, pp. 62–73 (1993)

  23. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in CryptologyCRYPTO 2001, Springer, Berlin, pp. 213–229 (2001)

  24. Gentry, C., Halevi, S.: Hierarchical identity based encryption with polynomially many levels. In: Theory of Cryptography Conference, pp. 437–456. Springer, Berlin (2009)

  25. Li, Y., Lipmaa, H., Pei, D.: On delegatability of four designated verifier signatures. ICICS 3783, 61–71 (2005)

    MathSciNet  MATH  Google Scholar 

  26. Tian, H., Jiang, Z., Liu, Y., Wei, B.: A non-delegatable strong designated verifier signature without random oracles. In: 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS), IEEE, pp. 237–244 (2012)

  27. Dent, A.W.: A survey of certificateless encryption schemes and security models. Int. J. Inf. Secur. 7(5), 349–377 (2008)

    Article  Google Scholar 

  28. Yuan, Y., Wang, C.: Certificateless signature scheme with security enhanced in the standard model. Inf. Process. Lett. 114(9), 492–499 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  29. Waters, B.: Efficient identity-based encryption without random oracles. In: Eurocrypt’05 3494 , pp. 114–127 (2005)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Willy Susilo.

Ethics declarations

Conflict of interest

Authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rastegari, P., Susilo, W. & Dakhilalian, M. Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model. Int. J. Inf. Secur. 18, 619–635 (2019). https://doi.org/10.1007/s10207-019-00430-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-019-00430-5

Keywords

Navigation