Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications

Most of the strong designated verifier signature (SDVS) schemes cannot tell the real signature generator when the signer and the designated verifier dispute on a signature. In other words, most of the SDVS schemes do not have the undeniability property. In this paper, we propose two SDVS schemes which hold the undeniability property, namely, strong designated verifier signature with undeniability property (SDVSUP). Our two schemes are called SDVSUP-1 and SDVSUP-2. In our two SDVSUP schemes, the signer not only can designate a verifier but also can designate an arbiter who can judge the signature when the signer and the designated verifier dispute on the signature. What is more, the judgment procedure can be performed by the arbiter alone without help from the signer or the designated verifier, which increases the judgment efficiency and reduces the complexity of signature confirmation. We also demonstrate a real instance of applying our SDVSUP scheme to electronic bidding system.

[1]  Shanshan Duan,et al.  Certificateless undeniable signature scheme , 2008, Inf. Sci..

[2]  Dong Hoon Lee,et al.  Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability , 2012 .

[3]  Yong Yu,et al.  A novel construction of SDVS with secure disavowability , 2013, Cluster Computing.

[4]  Guomin Yang,et al.  Efficient strong designated verifier signature schemes without random oracle or with non-delegatability , 2011, International Journal of Information Security.

[5]  Sk Hafizul Islam,et al.  Provably Secure and Pairing-Based Strong Designated Verifier Signature Scheme with Message Recovery , 2015 .

[6]  Hugo Krawczyk,et al.  Chameleon Hashing and Signatures , 1998, IACR Cryptol. ePrint Arch..

[7]  David Chaum,et al.  Undeniable Signatures , 1989, CRYPTO.

[8]  Qi Xia,et al.  A Strong Designated Verifier Signature Scheme with Secure Disavowability , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[9]  Ron Steinfeld,et al.  Universal Designated-Verifier Signatures , 2003, ASIACRYPT.

[10]  Yi Liu,et al.  A systematic method to design strong designated verifier signature without random oracles , 2013, Cluster Computing.

[11]  Hugo Krawczyk,et al.  RSA-Based Undeniable Signatures , 2015, Journal of Cryptology.

[12]  Sk Hafizul Islam,et al.  A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings , 2014, J. King Saud Univ. Comput. Inf. Sci..

[13]  Feng Bao,et al.  Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.

[14]  Yi Mu,et al.  Secure universal designated verifier signature without random oracles , 2008, International Journal of Information Security.

[15]  Han-Yu Lin,et al.  An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce , 2012, J. Inf. Sci. Eng..

[16]  Yi Mu,et al.  Short Designated Verifier Signature Scheme and Its Identity-based Variant , 2008, Int. J. Netw. Secur..

[17]  Markus Jakobsson,et al.  Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.

[18]  Yang Ming,et al.  Designated Verifier Proxy Signature Scheme with Multi-warrant in the Standard Model ⋆ , 2013 .

[19]  Kaoru Kurosawa,et al.  The security of the FDH variant of Chaum's undeniable signature scheme , 2005, IEEE Transactions on Information Theory.

[20]  M. Seshadri Srinath,et al.  Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme , 2018, Int. J. Netw. Secur..

[21]  David Chaum,et al.  Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.

[22]  Guomin Yang,et al.  Identity-based strong designated verifier signature revisited , 2011, J. Syst. Softw..