A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure
Certificateless public key cryptography is a commonly adopted implementation system to solve problems of key-escrow and untrusted authority. Certificateless strong designated verifier signatures (CL-SDVSs) are special variations of digital signatures, since their authenticity can only be convinced b...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8302490/ |
_version_ | 1818927818175676416 |
---|---|
author | Han-Yu Lin |
author_facet | Han-Yu Lin |
author_sort | Han-Yu Lin |
collection | DOAJ |
description | Certificateless public key cryptography is a commonly adopted implementation system to solve problems of key-escrow and untrusted authority. Certificateless strong designated verifier signatures (CL-SDVSs) are special variations of digital signatures, since their authenticity can only be convinced by a designated verifier. To offer this functionality, most CL-SDVS mechanisms use shared secret key between a signer and a designated verifier. However, Shim points out that the leakage of common values will inevitably delegate signing capability to any third party. Furthermore, we notice that such protocols also cannot fulfill the notion of signer ambiguity if a signer's private key is compromised, and signatures have not been received by a designated verifier. In this paper, the author defines the first formal security model of strong signer ambiguity against key-compromise attacks (SSA-KCA) for CL-SDVS schemes. Then, a concrete construction satisfying not only the proposed SSA-KCA security, but also the essential existential unforgeability under adaptive chosen-message attacks (EUF-CMA) security against super-level adversaries is presented. We show that our construction is both non-delegatable and non-transferable. In addition, without using time-consuming bilinear pairings, the proposed scheme exhibits lower computational costs and shorter signature lengths when compared with previous works, which makes our protocol suitable for computationconstrained mobile devices in low-bandwidth Internet of Thing communication environments. |
first_indexed | 2024-12-20T03:19:03Z |
format | Article |
id | doaj.art-9ebaef5c0cba47efad4fc904719c6298 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-20T03:19:03Z |
publishDate | 2018-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-9ebaef5c0cba47efad4fc904719c62982022-12-21T19:55:16ZengIEEEIEEE Access2169-35362018-01-016507655077510.1109/ACCESS.2018.28094378302490A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA SecureHan-Yu Lin0https://orcid.org/0000-0003-3657-3241Department of Computer Science and Engineering, National Taiwan Ocean University, Keelung, TaiwanCertificateless public key cryptography is a commonly adopted implementation system to solve problems of key-escrow and untrusted authority. Certificateless strong designated verifier signatures (CL-SDVSs) are special variations of digital signatures, since their authenticity can only be convinced by a designated verifier. To offer this functionality, most CL-SDVS mechanisms use shared secret key between a signer and a designated verifier. However, Shim points out that the leakage of common values will inevitably delegate signing capability to any third party. Furthermore, we notice that such protocols also cannot fulfill the notion of signer ambiguity if a signer's private key is compromised, and signatures have not been received by a designated verifier. In this paper, the author defines the first formal security model of strong signer ambiguity against key-compromise attacks (SSA-KCA) for CL-SDVS schemes. Then, a concrete construction satisfying not only the proposed SSA-KCA security, but also the essential existential unforgeability under adaptive chosen-message attacks (EUF-CMA) security against super-level adversaries is presented. We show that our construction is both non-delegatable and non-transferable. In addition, without using time-consuming bilinear pairings, the proposed scheme exhibits lower computational costs and shorter signature lengths when compared with previous works, which makes our protocol suitable for computationconstrained mobile devices in low-bandwidth Internet of Thing communication environments.https://ieeexplore.ieee.org/document/8302490/Certificatelessstrong designated verifiersigner ambiguitykey-compromisenon-delegatable |
spellingShingle | Han-Yu Lin A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure IEEE Access Certificateless strong designated verifier signer ambiguity key-compromise non-delegatable |
title | A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure |
title_full | A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure |
title_fullStr | A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure |
title_full_unstemmed | A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure |
title_short | A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure |
title_sort | new certificateless strong designated verifier signature scheme non delegatable and ssa kca secure |
topic | Certificateless strong designated verifier signer ambiguity key-compromise non-delegatable |
url | https://ieeexplore.ieee.org/document/8302490/ |
work_keys_str_mv | AT hanyulin anewcertificatelessstrongdesignatedverifiersignatureschemenondelegatableandssakcasecure AT hanyulin newcertificatelessstrongdesignatedverifiersignatureschemenondelegatableandssakcasecure |