Code-based authentication with designated verifier

The public key encryption scheme based on the bounded decoding problem was first introduced by McEliece in 1978. Since then, several code-based signature schemes have been designed. Most of them have been analysed and proven secure against different types of adversaries. However, researchers have given less attention to the code-based strong Designated Verifier Signature DVS scheme. In this paper, we introduce a new strong DVS scheme. It is based on CFS signature and Stern's identification scheme, whose security depends on syndrome decoding problem and bounded decoding problem. The proposed scheme is the first code-based strong DVS, and also satisfies the strong designated verifier, unforgeability and non-delegatability properties which are the security requirements for a strong DVS.

[1]  Olivier Markowitch,et al.  An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.

[2]  Fuw-Yi Yang,et al.  A Provably Secure and Efficient Strong Designated Verifier Signature Scheme , 2010 .

[3]  David Chaum,et al.  Undeniable Signatures , 1989, CRYPTO.

[4]  Feng Bao,et al.  Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.

[5]  Chun-I Fan,et al.  Attribute-based strong designated-verifier signature scheme , 2012, J. Syst. Softw..

[6]  Ji-Seon Lee,et al.  Comment on Saeednia et al.'s strong designated verifier signature scheme , 2009, Comput. Stand. Interfaces.

[7]  Markus Jakobsson,et al.  Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.

[8]  Guomin Yang,et al.  Identity-based strong designated verifier signature revisited , 2011, J. Syst. Softw..

[9]  Caixue Zhou Attacks on a Strong Designated Verifier Proxy Signature Scheme , 2014 .

[10]  Pierre-Louis Cayrel,et al.  A New Efficient Threshold Ring Signature Scheme Based on Coding Theory , 2011, IEEE Trans. Inf. Theory.

[11]  Changlu Lin,et al.  Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[12]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[13]  Ed Dawson,et al.  A novel identity-based strong designated verifier signature scheme , 2009, J. Syst. Softw..

[14]  Sk Hafizul Islam,et al.  A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings , 2014, J. King Saud Univ. Comput. Inf. Sci..

[15]  Sk Hafizul Islam,et al.  Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings , 2013, J. King Saud Univ. Comput. Inf. Sci..

[16]  Baoyuan Kang,et al.  On Delegatability of Some Strong Designated Verifier Signature Schemes , 2014 .

[17]  Elwyn R. Berlekamp,et al.  On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[18]  Dong Hoon Lee,et al.  Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof , 2010, Comput. Electr. Eng..

[19]  Jacques Stern,et al.  A New Identification Scheme Based on Syndrome Decoding , 1993, CRYPTO.

[20]  Fabien Laguillaumie,et al.  Multi-designated Verifiers Signatures , 2004, ICICS.

[21]  Yi Mu,et al.  Identity-Based Strong Designated Verifier Signature Schemes , 2004, ACISP.

[22]  Matthieu Finiasz,et al.  How to Achieve a McEliece-Based Digital Signature Scheme , 2001, ASIACRYPT.

[23]  Ed Dawson,et al.  Identity-based strong designated verifier signature schemes: Attacks and new construction , 2009, Comput. Electr. Eng..

[24]  Ammar Bouallegue,et al.  Secure and Fast Digital Signatures using BCH Codes , 2006 .

[25]  Kyung-Ah Shim On delegatability of designated verifier signature schemes , 2014, Inf. Sci..

[26]  Eun-Jun Yoon An Efficient and Secure Identity-Based Strong Designated Verifier Signature Scheme , 2011, Inf. Technol. Control..

[27]  Martin Stanek,et al.  On Designated Verifier Signature Schemes , 2010, IACR Cryptol. ePrint Arch..

[28]  Yi Liu,et al.  A non-delegatable strong designated verifier signature in ID-based setting for mobile environment , 2013, Math. Comput. Model..

[29]  Yi Mu,et al.  Restricted Universal Designated Verifier Signature , 2006, UIC.