Abstract

Strong designated verifier signature can provide an efficient way to protect the identity privacy of the signer and the integrity of the data transmitted over the public channel. These characteristics make it very useful in outsourcing computing, electronic voting, electronic bidding, electronic auction and other fields. However, most strong designated verifier signature schemes are unable to identify the real signature generator when the signer and the designated verifier dispute a signature. In addition, the existing strong designated verifier signature schemes in the standard model rarely satisfy strong unforgeability, and thus cannot prevent the attacker from forging a valid signature on any previously signed message. Therefore, designing a strong designated verifier signature scheme without random oracles that satisfies strong unforgeability and undeniability is very attractive in both practice and theory. Motivated by these concerns, we design the first undeniable strong designated verifier signature scheme without random oracles, in which the arbiter can independently perform the judgment procedure to prove whether a controversial signature is generated by the signer or the designated verifier. Under standard assumptions, the scheme is proved to be strongly unforgeable in standard model. Furthermore, it not only achieves non-transferability and privacy of the signer’s identity but also satisfies the undeniable property of traditional digital signature schemes. Performance analysis results show that the length of the signer’s private key, the designated verifier’s private key and signature length are 40 bits, 40 bits and 384 bits, respectively. Compared with he related schemes, the proposed scheme has higher performance in signature length, private key size and computational overhead. Finally, we show how to apply it to implement outsourcing computation in cloud computing.

Highlights

  • Digital signature is a very important information security technology, which can realize data integrity, non-repudiation, identity authentication and other functions

  • An strong designated verifier signature (SDVS) scheme is said to be undeniable if there exists a probabilistic polynomial-time (PPT) arbiter, with inputting the signer’s public key pk S, the designated verifier’s public key pkV, the arbiter’s private key sk A and a disputed signature σon a message m, can prove whether the signer S or the designated verifier V generated σwith an overwhelming probability, namely, Pr [id ∈ {S, V } ← Arbiter] ≈ 1

  • The performance analysis results show that the SDVS-USU scheme has better performance in terms of private key size, signature length and computational overhead

Read more

Summary

Introduction

Digital signature is a very important information security technology, which can realize data integrity, non-repudiation, identity authentication and other functions. It plays an important role in network security communication [1], e-commerce [2], e-government [3] and other systems [4,5,6]. In a SDVS scheme, any third party does not know who generated the signature when the signer and the designated verifier dispute a signature. In this scenario, the undeniability property is very essential for SDVS. SDVS schemes [20], none of them has the undeniable property in the standard model

Our Contribution
Paper Organization
Related Work
Bilinear Paring
Complexity Assumptions
Strong Designated Verifier Signature
The SDVS-USU Scheme
Security Analysis
Comparison
Application in Outsourcing Computing in Cloud Computing
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.