Non-delegatable Strong Designated Verifier Signature on Elliptic Curves

We propose a non-delegatable strong designated verifier signature on elliptic curves. The size of the signature is less than 500 bits considering an 80 bits security strength. It provably satisfies the non-delegatability and signer ambiguity properties. The construction method is a combination of the Schnorr signature and the elliptic curve Diffie-Hellman problem.

[1]  Jianhua Li,et al.  Delegatability of an Identity Based Strong Designated Verifier Signature Scheme , 2010, Informatica.

[2]  Qiong Huang,et al.  Non-delegatable Identity-based Designated Verifier Signature , 2009, IACR Cryptol. ePrint Arch..

[3]  Guomin Yang,et al.  Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability , 2009, IACR Cryptol. ePrint Arch..

[4]  Yi Mu,et al.  Designated Verifier Signature: Definition, Framework and New Constructions , 2007, UIC.

[5]  Mihir Bellare,et al.  Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.

[6]  Fabien Laguillaumie,et al.  Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map , 2004, SCN.

[7]  Ivan Damgård,et al.  Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks , 1991, CRYPTO.

[9]  Ji-Seon Lee,et al.  Comment on Saeednia et al.'s strong designated verifier signature scheme , 2009, Comput. Stand. Interfaces.

[10]  Ueli Maurer,et al.  Advances in Cryptology — EUROCRYPT ’96 , 2001, Lecture Notes in Computer Science.

[11]  Bin Wang A non-delegatable identity-based strong designated verifier signature scheme , 2008, IACR Cryptol. ePrint Arch..

[12]  Raylin Tso,et al.  Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms , 2005, CISC.

[13]  Reihaneh Safavi-Naini,et al.  Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures , 2008, Public Key Cryptography.

[14]  Ronald Cramer,et al.  Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings , 2008, Public Key Cryptography.

[15]  Jonathan Katz,et al.  Efficiency improvements for signature schemes with tight security reductions , 2003, CCS '03.

[16]  Yi Mu,et al.  Short Designated Verifier Signature Scheme and Its Identity-based Variant , 2008, Int. J. Netw. Secur..

[17]  Markus Jakobsson,et al.  Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.

[18]  Jongin Lim,et al.  Information Security and Cryptology - ICISC 2003 , 2003, Lecture Notes in Computer Science.

[19]  Joan Feigenbaum,et al.  Advances in Cryptology-Crypto 91 , 1992 .

[20]  Olivier Markowitch,et al.  An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.

[21]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[22]  Feng Bao,et al.  Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.

[23]  Guomin Yang,et al.  Identity-based strong designated verifier signature revisited , 2011, J. Syst. Softw..

[24]  Jeffrey Shallit,et al.  Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.

[25]  Jianhong Zhang,et al.  A novel ID-based designated verifier signature scheme , 2008, Inf. Sci..

[26]  Steven D. Galbraith,et al.  Hidden Pairings and Trapdoor DDH Groups , 2006, ANTS.

[27]  Ashutosh Saxena,et al.  Identity Based Strong Designated Verifier Signature Scheme , 2007, Informatica.

[28]  Colin Boyd,et al.  Advances in Cryptology - ASIACRYPT 2001 , 2001 .

[29]  Yi Mu,et al.  Universal Designated Verifier Signature Without Delegatability , 2006, ICICS.

[30]  Jianying Zhou,et al.  Information and Communications Security , 2013, Lecture Notes in Computer Science.

[31]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[32]  Robin Milner,et al.  On Observing Nondeterminism and Concurrency , 1980, ICALP.