Cryptography Teaching Based on Problem Oriented: Take the Knowledge Point of Designated Verifier Signature as an Example

In traditional digital signature, anyone who knows the public key of the signer can verify the signer which is not suitable for applying in some environments of needing privacy. Designated verifier signature (DVeSi) scheme can solve this problem in where only the designated verifier can verify the validation of a signature. DVeSi's property makes it broadly be applied into many sences. DVeSi also becomes the main content of the cryptography course in many universities. However, DVeSi's complex makes it be hard to master for students. In our cryptography course, we try to adopt the problem oriented teaching method which has some good effect. In this paper, combining our actual teaching experience and problem oriented teaching method, we analyze the security of two DVeSi schemes which were proposed recently and we find that the two schemes exist some drawbacks. We present the knowledge of DVeSi scheme by presenting their drawbacks and demonstrating the forgery attack and delegation attack existing in the two schemes. Finally, we also give some improvement methods to overcome these drawbacks. Our teaching method has achieved good results for students to acquire knowledge, which has the reference value for other educators.

[1]  Ed Dawson,et al.  A novel identity-based strong designated verifier signature scheme , 2009, J. Syst. Softw..

[2]  Sk Hafizul Islam,et al.  Provably Secure and Pairing-Based Strong Designated Verifier Signature Scheme with Message Recovery , 2015 .

[3]  Addepalli Hari Narayana,et al.  A Hybrid Digital Signature Scheme on Dependable and Secure Data , 2018 .

[4]  Bikram Kesari Ratha,et al.  A Secure Strong Designated Verifier Signature Scheme , 2017, Int. J. Netw. Secur..

[5]  Du Hongzhen Cryptanalysis of strong designated verifier signature scheme , 2011 .

[6]  H. R. Chennamma,et al.  Video Authentication Using Watermark and Digital Signature—A Study , 2017 .

[7]  Hai-Tao Wu,et al.  A New Designated Verifier Proxy Signature in Standard Model , 2017 .

[8]  Zhang Yun Security analysis and improvement of certificateless signature scheme , 2013 .

[9]  Yi Liu,et al.  A non-delegatable strong designated verifier signature in ID-based setting for mobile environment , 2013, Math. Comput. Model..

[10]  Han-Yu Lin,et al.  A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise Attacks , 2017 .

[11]  Ji-Seon Lee,et al.  Comment on Saeednia et al.'s strong designated verifier signature scheme , 2009, Comput. Stand. Interfaces.

[12]  Changlu Lin,et al.  Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[13]  Li Xu,et al.  A new universal designated verifier transitive signature scheme for big graph data , 2017, J. Comput. Syst. Sci..

[14]  Kyung-Ah Shim On delegatability of designated verifier signature schemes , 2014, Inf. Sci..

[15]  Yang Zhao,et al.  A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability , 2017, Int. J. Netw. Secur..

[16]  Xing Zhang,et al.  A New Digital Signature Scheme from Layered Cellular Automata , 2016, Int. J. Netw. Secur..

[17]  Mohammad Reza Aref,et al.  Provably secure strong designated verifier signature scheme based on coding theory , 2017, Int. J. Commun. Syst..

[18]  Guomin Yang,et al.  Efficient strong designated verifier signature schemes without random oracle or with non-delegatability , 2011, International Journal of Information Security.

[19]  Dongdai Lin,et al.  Security Analysis of Some Batch Verifying Signatures from Pairings , 2006, Int. J. Netw. Secur..

[20]  Xiaoming Hu,et al.  Short and provably secure designated verifier proxy signature scheme , 2016, IET Inf. Secur..

[21]  Xiaoming Hu,et al.  An efficient designated verifier signature scheme with pairing-free and low cost , 2016, Secur. Commun. Networks.

[22]  Xiaoming Hu,et al.  Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications , 2017, Secur. Commun. Networks.

[23]  Yu-Guang Yang,et al.  A scheme on converting quantum signature with public verifiability into quantum designated verifier signature , 2018, Optik.

[24]  Markus Jakobsson,et al.  Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.

[25]  Ji Geng,et al.  Cryptanalysis of Attribute-based Ring Signcryption Scheme , 2015, Int. J. Netw. Secur..

[26]  Guomin Yang,et al.  Identity-based strong designated verifier signature revisited , 2011, J. Syst. Softw..

[27]  Pankaj Sarde,et al.  Strong Designated Verifier Signature Scheme Based on Discrete Logarithm Problem , 2015 .