A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure

Certificateless public key cryptography is a commonly adopted implementation system to solve problems of key-escrow and untrusted authority. Certificateless strong designated verifier signatures (CL-SDVSs) are special variations of digital signatures, since their authenticity can only be convinced b...

Full description

Bibliographic Details
Main Author: Han-Yu Lin
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8302490/
_version_ 1818927818175676416
author Han-Yu Lin
author_facet Han-Yu Lin
author_sort Han-Yu Lin
collection DOAJ
description Certificateless public key cryptography is a commonly adopted implementation system to solve problems of key-escrow and untrusted authority. Certificateless strong designated verifier signatures (CL-SDVSs) are special variations of digital signatures, since their authenticity can only be convinced by a designated verifier. To offer this functionality, most CL-SDVS mechanisms use shared secret key between a signer and a designated verifier. However, Shim points out that the leakage of common values will inevitably delegate signing capability to any third party. Furthermore, we notice that such protocols also cannot fulfill the notion of signer ambiguity if a signer's private key is compromised, and signatures have not been received by a designated verifier. In this paper, the author defines the first formal security model of strong signer ambiguity against key-compromise attacks (SSA-KCA) for CL-SDVS schemes. Then, a concrete construction satisfying not only the proposed SSA-KCA security, but also the essential existential unforgeability under adaptive chosen-message attacks (EUF-CMA) security against super-level adversaries is presented. We show that our construction is both non-delegatable and non-transferable. In addition, without using time-consuming bilinear pairings, the proposed scheme exhibits lower computational costs and shorter signature lengths when compared with previous works, which makes our protocol suitable for computationconstrained mobile devices in low-bandwidth Internet of Thing communication environments.
first_indexed 2024-12-20T03:19:03Z
format Article
id doaj.art-9ebaef5c0cba47efad4fc904719c6298
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-20T03:19:03Z
publishDate 2018-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-9ebaef5c0cba47efad4fc904719c62982022-12-21T19:55:16ZengIEEEIEEE Access2169-35362018-01-016507655077510.1109/ACCESS.2018.28094378302490A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA SecureHan-Yu Lin0https://orcid.org/0000-0003-3657-3241Department of Computer Science and Engineering, National Taiwan Ocean University, Keelung, TaiwanCertificateless public key cryptography is a commonly adopted implementation system to solve problems of key-escrow and untrusted authority. Certificateless strong designated verifier signatures (CL-SDVSs) are special variations of digital signatures, since their authenticity can only be convinced by a designated verifier. To offer this functionality, most CL-SDVS mechanisms use shared secret key between a signer and a designated verifier. However, Shim points out that the leakage of common values will inevitably delegate signing capability to any third party. Furthermore, we notice that such protocols also cannot fulfill the notion of signer ambiguity if a signer's private key is compromised, and signatures have not been received by a designated verifier. In this paper, the author defines the first formal security model of strong signer ambiguity against key-compromise attacks (SSA-KCA) for CL-SDVS schemes. Then, a concrete construction satisfying not only the proposed SSA-KCA security, but also the essential existential unforgeability under adaptive chosen-message attacks (EUF-CMA) security against super-level adversaries is presented. We show that our construction is both non-delegatable and non-transferable. In addition, without using time-consuming bilinear pairings, the proposed scheme exhibits lower computational costs and shorter signature lengths when compared with previous works, which makes our protocol suitable for computationconstrained mobile devices in low-bandwidth Internet of Thing communication environments.https://ieeexplore.ieee.org/document/8302490/Certificatelessstrong designated verifiersigner ambiguitykey-compromisenon-delegatable
spellingShingle Han-Yu Lin
A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure
IEEE Access
Certificateless
strong designated verifier
signer ambiguity
key-compromise
non-delegatable
title A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure
title_full A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure
title_fullStr A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure
title_full_unstemmed A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure
title_short A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure
title_sort new certificateless strong designated verifier signature scheme non delegatable and ssa kca secure
topic Certificateless
strong designated verifier
signer ambiguity
key-compromise
non-delegatable
url https://ieeexplore.ieee.org/document/8302490/
work_keys_str_mv AT hanyulin anewcertificatelessstrongdesignatedverifiersignatureschemenondelegatableandssakcasecure
AT hanyulin newcertificatelessstrongdesignatedverifiersignatureschemenondelegatableandssakcasecure