Highly efficient strong designated verifier signature schemes in the standard model

In the last of years, many strong designated verifier signature schemes have been proposed. However, most of existing designated verifier proxy signature schemes are only secure in the random oracle which has suffered a lot of criticism. Therefore, secure and strong designated verifier signature in the standard model has attracted much interesting. In this paper, based on bilinear map, we propose two new strong designated verifier signature schemes. We present detailed secure proof for the proposed schemes in the standard model based on computational Diffie-Hellman assumption and bilinear Diffie-Hellman assumption respectively. Compared with other strong designated verifier signature schemes, our two schemes have two advantages: lower computation cost and less signature length.

[1]  Ed Dawson,et al.  A novel identity-based strong designated verifier signature scheme , 2009, J. Syst. Softw..

[2]  Zhenfu Cao,et al.  An identity based universal designated verifier signature scheme secure in the standard model , 2009, J. Syst. Softw..

[3]  Yi Liu,et al.  An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[4]  Jean-Jacques Quisquater,et al.  Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions , 2006, SCN.

[5]  Mahmoud Salmasizadeh,et al.  A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles , 2012, IACR Cryptol. ePrint Arch..

[6]  Ivan Damgård,et al.  Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.

[7]  Markus Jakobsson,et al.  Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.

[8]  Jianhong Zhang,et al.  An Efficient Designated Verifier Signature Scheme without Random Oracles , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[9]  Yi Liu,et al.  A systematic method to design strong designated verifier signature without random oracles , 2013, Cluster Computing.

[10]  Yi Mu,et al.  Designated Verifier Signature: Definition, Framework and New Constructions , 2007, UIC.

[11]  Feng Bao,et al.  Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.

[12]  Olivier Markowitch,et al.  An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.

[13]  Jianhua Li,et al.  Delegatability of an Identity Based Strong Designated Verifier Signature Scheme , 2010, Informatica.

[14]  Xianhui Lu,et al.  A Short Signature Scheme in the Standard Model , 2007, IACR Cryptol. ePrint Arch..

[15]  Xiaofeng Chen,et al.  Non-delegatable Strong Designated Verifier Signature on Elliptic Curves , 2011, ICISC.