DOI QR코드

DOI QR Code

Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group

  • Deng, Lunzhi (School of Mathematical Sciences, Guizhou Normal University) ;
  • Yang, Yixian (Guizhou University, Guizhou Provincial Key Laboratory of Public Big Data) ;
  • Chen, Yuling (Guizhou University, Guizhou Provincial Key Laboratory of Public Big Data)
  • Received : 2016.04.06
  • Accepted : 2017.07.07
  • Published : 2017.11.30

Abstract

Certificateless public key cryptography resolves the certificate management problem in traditional public key cryptography and the key escrow problem in identity-based cryptography. In recent years, some good results have been achieved in speeding up the computation of bilinear pairing. However, the computation cost of the pairing is much higher than that of the scalar multiplication over the elliptic curve group. Therefore, it is still significant to design cryptosystem without pairing operations. A multi-signer universal designated multi-verifier signature scheme allows a set of signers to cooperatively generate a public verifiable signature, the signature holder then can propose a new signature such that only the designated set of verifiers can verify it. Multi-signer universal designated multi-verifier signatures are suitable in many different practical applications such as electronic tenders, electronic voting and electronic auctions. In this paper, we propose a certificateless multi-signer universal designated multi-verifier signature scheme and prove the security in the random oracle model. Our scheme does not use pairing operation. To the best of our knowledge, our scheme is the first certificateless multi-signer universal designated multi-verifier signature scheme.

Keywords

References

  1. A. Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology-Crypto 1984, LNCS, vol. 196, pp. 47-53, 1984.
  2. S.S. Al-Riyami, K.G.Paterson, "Certificateless public key cryptography," Advances in Cryptology-Asiacrypt 2003, LNCS, vol. 2894, pp. 452-473, 2003.
  3. M. Jakobsson, K. Sako, R. Impagliazzo, "Designated verifier proofs and their applications," Advances in Cryptology-Eurocrypt 1996, LNCS, vol. 1070, pp. 142-154, 1996.
  4. S. Saeednia, S. Kremer, O. Markowitch, "An efficient strong designated verifier signature scheme," in Proc. of International Conference on Information Security and Cryptology(ICISC 2003), LNCS, vol. 2869, pp. 40-54, 2003.
  5. R. Steinfeld, L. Bull, H. Wang, and J. Piperzyk, "Universal designated-verifier signatures," Advances in Cryptology-Asiacrypt 2003, LNCS, vol. 2894, pp. 523-543, 2003.
  6. F. Laguillaumie, D. Vergnaud, "Multi-designated verifiers signatures," in Proc. of International Conference on Information and Communications Security (ICICS 2004), LNCS, vol. 3269, pp. 495-507, 2004.
  7. F. Laguillaumie, D. Vergnaud, "Multi-designated verifiers signatures: Anonymity without encryption," Information Processing Letters, vol.102, no.2-3, pp. 127-132, 2007. https://doi.org/10.1016/j.ipl.2006.08.015
  8. C. Willy, W. Susilo, and Y. Mu, "Universal designated multi verifiers signature schemes," in Proc. of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), pp. 305-309, 2005.
  9. Y. Zhang, J. Zhang, and Y. Zhang, "Multi-signers strong designated verifier signature scheme," International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2008), pp. 324-328, 2008.
  10. G. Shailaja, K.P. Kumar, and A. Saxenh, "Universal designated multi verifier signature without random oracles," in Proc. of 9th International Conference on Information Technology (ICIT 2006), pp. 168-171, 2006.
  11. Y. Ming, Y. Yang, "Universal designated multi verifier signature scheme without random oracles," Wuhan University Journal of Natural Sciences, vol.13, no.6, pp. 685-691, 2008. https://doi.org/10.1007/s11859-008-0610-6
  12. T. Roeder, R.Pass, and F. Schneider, "Multi-verifier signatures," Journal of. Cryptology, vol. 25, pp, 310-348, 2012. https://doi.org/10.1007/s00145-010-9096-4
  13. Y. Zhang, M. Au, G. Yang, and W. Susilo, "(Strong) multi-designated verifiers signatures secure against rogue key attack," in Proc. of International Conference on Network and System Security on Network and System Security(ICNSS 2012), LNCS, vol. 7645, pp. 334-347, 2012.
  14. F. Zhang, W. Susilo, Y. Mu, and X. Chen, "Identity-based universal designated verifier signatures," in Proc. of International Conference on Embedded and Ubiquitous Computing (ICEUC 2005) , LNCS, vol. 3823, pp. 825-834, 2005.
  15. B. Kang, C. Boyd, and E. Dawson, "A novel identity-based strong designated verifier signature scheme," Journal of Systems and Software, vol.82, no.2, pp. 270-273, 2009. https://doi.org/10.1016/j.jss.2008.06.014
  16. Lin, H.Y., "Toward secure strong designated verifier signature scheme from identity-based system," The International Arab Journal of Information Technology, vol. 11, no. 4, pp.315-321, 2014.
  17. S.H. Seo, J.Y. Hwang, K.Y. Choi, and D.H. Lee, "Identity-based universal designated multi-verifiers signature schemes," Computer Standards and Interfaces, vol. 30, no.5, pp.288-295, 2008. https://doi.org/10.1016/j.csi.2007.08.020
  18. T. Y. Chang, "An ID-based multi-signer universal designated multi-verifier signature scheme," Information and Computation, vol. 209, pp. 1007-1015, 2011. https://doi.org/10.1016/j.ic.2011.03.002
  19. Y. Ming, Q. Jin, and X. Zhao, "A multi-signer universal designated multi-verifier signature scheme in the standard model," Journal of Computational Information Systems, vol.9, no. 9, pp.3751-3758, 2013.
  20. X. Huang, W. Susilo, Y. Mu, and F. Zhang, "Certificateless designated verifier signature schemes," in Proc. of the 20th International Conference on Advanced Information Networking and Applications, pp. 15-19. 2006.
  21. Y. Ming, X. Shen, and Y. Wang, "Certificateless universal designated verifier signature schemes," The Journal of China Universities of Posts and Telecommunications, vol.14, no.3, pp, 85-90, 2007.
  22. B.Yang, Z. Hu, and Z. Xiao, "Efficient certificateless strong designated verifier signature scheme," in Proc. of 2009 International Conference on Computational Intelligence and Security, pp. 432-436, 2009.
  23. H.Du, Q. Wen, "Efficient certificateless designated verifyer signatures and proxy signatures," Chinese Journal of Electronics, vol.18, no.1, pp, 95-100, 2009.
  24. D. He, J. Chen, "An efficient certificateless designated verifier signature scheme," International Arab Journal of Information Technology, vol.10, no.4, pp. 389-396, 2013.
  25. M. Bellare, G. Neven, "MultiSignatures in the plain public key model and a general forking lemma," in Proc. of the 13th ACM Conference on Computer and Communications Security, pp. 390-399, 2006.