An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared Verification

Volume 7, Issue 1
Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting, Hsu-Lun Wu
Published online: 27 February 2021
Article Views: 20

Abstract
This paper proposes an efficient Strong Designated Multi-Verifier Signature (SDMVS) scheme for facilitating the privacy preserving group-oriented electronic commerce applications. A Designated Verifier Signature (DVS) scheme can support online transactions that must simultaneously guarantee the property of confidentiality and authenticity since the generated signature can only be authenticated by a designated verifier. In this study, we combine the concept of DVS and multi-recipients to propose an SDMVS scheme. In particular, our mechanism further enables a group of intended recipients to examine the signature validity. All members of the designated verifier group must cooperate in carrying out the signature verification procedure. Besides, the property of non-transferability provides the designated verifier group with the ability to create another legitimate transcript that is hard to be differentiated from the original signature. The analysis results of security proof and efficiency show that the construction of our system fulfills essential security requirements, and the expansion of group size will not influence the computational costs of each party.
Reference
- A. Nandanavanam, I. Upasana, and N. Nandanavanam, “NTRU and RSA cryptosystems for data security in IoT environment,” in International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE), Bengaluru, India. IEEE, 2020, pp. 371-376.
- K. Pavani and P. Sriramya, “Enhancing public key cryptography using RSA, RSA-CRT and N-prime RSA with multiple keys,” in Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India, 2021.
- A. H. Alhussain et al., “Using deterministic genetic algorithm to provide secured cryptographic pseudo-random number generators,” International Journal of Technology and Engineering Studies, vol. 1, no. 4, pp. 107–116, 2015. doi: https://doi.org/10.20469/ijtes.40001-4
- L. Zhong and Z. Dai, “The copyright protection and fair use of commercial data collections based on big data,” in 2nd International Conference on Education, Knowledge and Information Management (ICEKIM), Xiamen, China, 2021.
- L. Liu, W. Shang, W. Lin, and W. Huang, “A decentralized copyright protection, transaction and content distribution system based on blockchain 3.0,” in 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter), Ho Chi Minh City, Vietnam. IEEE, 2021, pp. 45–50.
- X. Peng, K. Ota, M. Dong, and H. Zhou, “Online resource auction for eavn with non-price attributes,” IEEE Transactions on Vehicular Technology, vol. 70, no. 7, pp. 7127–7137, 2021. doi: https://doi.org/10.1109/TVT.2021.3086179
- P. Kale, P. Hazarika, and B. Chandavarkar, “Undeniable signature scheme: A survey,” in 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India, 2020.
- M. Jakobsson, K. Sako, and R. Impagliazzo, “Designated verifier proofs and their applications,” in International Conference on the Theory and Applications of Cryptographic Techniques, Berlin Germany, 1996.
- S. Saeednia, S. Kremer, and O. Markowitch, “An efficient strong designated verifier signature scheme,” in International Conference on Information Security and Cryptology, Berlin, Germany, 2003.
- N. Zhang and Q. Wen, “Provably secure blind id-based strong designated verifier signature scheme,”in Second International Conference on Communications and Networking in China, Shanghai, China, 2007.
- J.-S. Lee and J. H. Chang, “Strong designated verifier signature scheme with message recovery,” in The 9th International Conference on Advanced Communication Technology, Gangwon, Korea, 2007.
- W. Lei and L. Daxing, “Strong designated verifier ID-based ring signature scheme,” in International Symposium on Information Science and Engineering, Shanghai, China, 2008.
- L. Zhang, S. He, and S. Liu, “A new identity-based strong designated verifier signature scheme,” in International Conference on Computer Science and Service System (CSSS), Nanjing, China. IEEE, 2011.
- H. Tian, “A new strong multiple designated verifiers signature for broadcast propagation,” in Third International Conference on Intelligent Networking and Collaborative Systems, Fukuoka, Japan, 2011.
- L. Deng, J. Zeng, and H. Huang, “ID-based multi-signer universal designated multi-verifier signature based on discrete logarithm,” Chiang Mai Journal of Science, vol. 45, no. 1, pp. 617–624, 2018.
- P. Rastegari, W. Susilo, and M. Dakhilalian, “Certificateless designated verifier signature revisited: Achieving a concrete scheme in the standard model,” International Journal of Information Security, vol. 18, no. 5, pp. 619–635, 2019. doi: https://doi.org/10.1007/s10207-019-00430-5
- M. Beheshti-Atashgah, M. R. Aref, M. Bayat, and M. Barari, “ID-based strong designated verifier signature scheme and its applications in internet of things,” in 27th Iranian Conference on Electrical Engineering (ICEE), Yazd, Iran, 2019.
- B. Gong, M. H. Au, and H. Xue, “Constructing strong designated verifier signatures from key encapsulation mechanisms,” in 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)/ Rotorua, New Zealand, 2019.
- S. Han, M. Xie, B. Yang, R. Lu, H. Bao, J. Lin, H.-B. Hong, M.-X. Gu, and S. Han, “A certificateless verifiable strong designated verifier signature scheme,” IEEE Access, vol. 7, pp. 126 391–126 408, 2019. doi: https://doi.org/10.1109/ACCESS.2019.2938898
- X. Hu, C. Ma, J. Wang, H. Xu, and W. Tan, “An undeniable strong dsvs scheme with no bilinear pairings,” in 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), Datong, China, 2016.
- M. Li and T. Fang, “Provably secure and efficient ID-based strong designated verifier signature scheme with message recovery,” in 17th International Conference on Network-Based Information Systems, Salerno, Italy, 2014.
- S. Shan, “On the security of a certificateless strong designated verifier signature scheme with non-delegatability,” in International Conference on Internet of Things and Intelligent Applications (ITIA), Zhenjiang, China, 2020.
- M. Ushida, K. Ohta, Y. Kawai, and K. Yoneyama, “Proxiable designated verifier signature,” in International Conference on Security and Cryptography (SECRYPT), Athens, Greece, 2010.
|