Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

邮发代号 80-970

2019 Impact Factor: 1.275

Frontiers of Computer Science  2020, Vol. 14 Issue (4): 144806   https://doi.org/10.1007/s11704-019-8320-0
  本期目录
Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature
E CHEN1, Yan ZHU1(), Changlu LIN2,3, Kewei LV4
1. School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China
2. College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China
3. Fujian Provincial Key Lab of Network Security & Cryptology, Fujian Normal University, Fuzhou 350007, China
4. Institute of Information Engineering, DCS Research Center, Chinese Academy of Sciences, Beijing 100093, China
 全文: PDF(388 KB)  
Abstract

In this paper we present a designated verifier-set signature (DVSS), in which the signer allows to designate many verifiers rather than one verifier, and each designated verifier can verify the validity of signature by himself. Our research starts from identity-based aggregator (IBA) that compresses a designated set of verifier’s identities to a constantsize random string in cryptographic space. The IBA is constructed by mapping the hash of verifier’s identity into zero or pole of a target curve, and extracting one curve’s point as the result of aggregation according to a specific secret. Considering the different types of target curves, these two IBAs are called as zeros-based aggregator and poles-based aggregator, respectively. Based on them, we propose a practical DVSS scheme constructed from the zero-pole cancellation method which can eliminate the same elements between zeros-based aggregator and poles-based aggregator. Due to this design, our DVSS scheme has some distinct advantages: (1) the signature supporting arbitrary dynamic verifiers extracted from a large number of users; and (2) the signature with short and constant length. We rigorously prove that our DVSS scheme satisfies the security properties: correctness, consistency, unforgeability and exclusivity.

Key wordsdesignated verifier-set signature    aggregator    unforgeability    exclusivity
收稿日期: 2018-09-20      出版日期: 2020-03-11
Corresponding Author(s): Yan ZHU   
 引用本文:   
. [J]. Frontiers of Computer Science, 2020, 14(4): 144806.
E CHEN, Yan ZHU, Changlu LIN, Kewei LV. Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature. Front. Comput. Sci., 2020, 14(4): 144806.
 链接本文:  
https://academic.hep.com.cn/fcs/CN/10.1007/s11704-019-8320-0
https://academic.hep.com.cn/fcs/CN/Y2020/V14/I4/144806
1 M Jakobsson, K Sako, R Impagliazzo. Designated verifier proofs and their applications. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 1996, 143–154
https://doi.org/10.1007/3-540-68339-9_13
2 R Steinfeld, L, Bull H Wang, J Pieprzyk. Universal designated-verifier signatures. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2003, 523–542
https://doi.org/10.1007/978-3-540-40061-5_33
3 S Saeednia, S Kremer, O Markowitch. An efficient strong designated verifier signature scheme. In: Proceedings of International Conference on Information Security and Cryptology. 2003, 40–54
https://doi.org/10.1007/978-3-540-24691-6_4
4 C Y Ng, W Susilo, Y Mu. Universal designated multi verifier signature schemes. In: Proceedings of the 11th International Conference on Parallel and Distributed Systems. 2005, 305–309
5 G Shailaja, K P Kumar, A Saxena. Universal designated multi verifier signature without random oracles. In: Proceeding of the 9th International Conference on Information Technology. 2006, 168–171
https://doi.org/10.1109/ICIT.2006.86
6 T Y. ChangAn ID-based multi-signer universal designated multiverifier signature scheme. Information and Computation, 2011, 209(7): 1007–1015
https://doi.org/10.1016/j.ic.2011.03.002
7 B Libert, S Ling, K Nguyen, H Wang. Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2016, 1–31
https://doi.org/10.1007/978-3-662-49896-5_1
8 R Steinfeld, H Wang, J Pieprzyk. Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. In: Proceedings of International Workshop on Public Key Cryptography. 2004, 86–100
https://doi.org/10.1007/978-3-540-24632-9_7
9 B Kang, C Boyd, E Dawson. Identity-based strong designated verifier signature schemes: attacks and new construction. Computers and Electrical Engineering, 2009, 35(1): 49–53
https://doi.org/10.1016/j.compeleceng.2008.05.004
10 A U Khan, B K Ratha, S Mohanty. A timestamp-based strong designated verifier signature scheme for next-generation network security services. In: Bhatia S, Mishra K, Tiwari S, Singh V, eds. Advances in Computer and Computational Sciences. Springer, Singapore, 2017, 311–320
https://doi.org/10.1007/978-981-10-3770-2_29
11 W Susilo, F Zhang, Y Mu. Identity-based strong designated verifier signature schemes. In: Proceedings of the Australasian Conference on Information Security and Privacy. 2004, 313–324
https://doi.org/10.1007/978-3-540-27800-9_27
12 H Tian, X, Chen J. LiA short non-delegatable strong designated verifier signature. In: Proceedings of Australasian Conference on Information Security and Privacy. 2012, 261–279
https://doi.org/10.1007/978-3-642-31448-3_20
13 K A Shim. On delegatability of designated verifier signature schemes. Information Sciences, 2014, 281: 365–372
https://doi.org/10.1016/j.ins.2014.05.020
14 Y Zhu, G Gan, R Guo, D Huang. Dual-mode broadcast encryption. Science China Information Sciences, 2018, 61(11): 118101
https://doi.org/10.1007/s11432-017-9287-6
15 F Zhang, W Susilo, Y Mu, X. ChenIdentity-based universal designated verifier signatures. In: Proceedings of the 2005 International Conference on Embedded and Ubiquitous Computing. 2005, 825–834
https://doi.org/10.1007/11596042_85
16 J Zhang, J. MaoA novel ID-based designated verifier signature scheme. Information Sciences, 2008, 178(3): 766–773
https://doi.org/10.1016/j.ins.2007.07.005
17 N Sharma, R A Sahu, V, Saraswat B K Sharma. Adaptively secure strong designated signature. In: Proceedings of International Conference on Cryptology in India. 2016, 43–60
https://doi.org/10.1007/978-3-319-49890-4_3
18 F Laguillaumie, D Vergnaud. Multi-designated verifiers signatures. In: Proceedings of the 6th International Conference on Information and Communications Security. 2004, 495–507
https://doi.org/10.1007/978-3-540-30191-2_38
19 F Laguillaumie, D Vergnaud. Multi-designated verifiers signatures: anonymity without encryption. Information Processing Letters, 2007, 102(2–3): 127–132
https://doi.org/10.1016/j.ipl.2006.08.015
20 Y Ming, Y Wang. Universal designated multi verifier signature scheme without random oracles. Wuhan University Journal of Natural Sci ences, 2008, 13(6): 685–691
https://doi.org/10.1007/s11859-008-0610-6
21 S H Seo, J Y Hwang, K Y, Choi D H. Lee Identity-based universal designated multi-verifiers signature schemes. Computer Standards and Interfaces, 2008, 30(5): 288–295
https://doi.org/10.1016/j.csi.2007.08.020
22 C Lin, W Wu, X, Huang L Xu. A new universal designated verifier transitive signature scheme for big graph data. Journal of Computer and System Science, 2017, 83(1): 73–83
https://doi.org/10.1016/j.jcss.2016.06.003
23 Y Shi, H, Fan Q. LiuAn obfuscatable designated verifier signature scheme. IEEE Transactions on Emerging Topics in Computing, 2017, 5(2): 271–285
https://doi.org/10.1109/TETC.2017.2663765
24 Y Zhu, G, Gan R, Guo D. Huang PHE: an efficient traitor tracing and revocation for encrypted file syncing-and-sharing in cloud. IEEE Transactions on Cloud Computing, 2016, 6(4): 1110–1124
https://doi.org/10.1109/TCC.2016.2573299
25 Y Zhu, G J Ahn, H Hu, S S Yau. H G An, C Hu. Dynamic audit services for outsourced storages in clouds. IEEE Transactions on Services Computing, 2013, 6(2): 227–238
https://doi.org/10.1109/TSC.2011.51
26 D Boneh, M Franklin. Identity-based encryption from the weil pairing. In: Proceedings of Annual International Cryptology Conference. 2001, 213–229
https://doi.org/10.1007/3-540-44647-8_13
27 D Boneh, M Franklin. Identity-based encryption from the weil pairing. SIAM Journal on Computing, 2003, 32(3): 586–615
https://doi.org/10.1137/S0097539701398521
28 D Boneh, X Boyen. Short signatures without random oracles. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2004, 56–73
https://doi.org/10.1007/978-3-540-24676-3_4
29 J H Cheon. Security analysis of the strong Diffie-Hellman problem. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2006, 1–11
https://doi.org/10.1007/11761679_1
30 D Boneh, X Boyen, E J Goh. Hierarchical identity based encryption with constant size ciphertext. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2005, 440–456
https://doi.org/10.1007/11426639_26
31 D Pointcheval, J. SternSecurity arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13(3): 361–396
https://doi.org/10.1007/s001450010003
32 S Schechter, T Parnell, A Hartemink. Anonymous authentication of membership in dynamic groups. In: Proceedings of International Conference on Financial Cryptography. 1999, 184–195
https://doi.org/10.1007/3-540-48390-X_14
33 D Boneh, C Gentry, B Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Proceedings of Annual International Cryptology Conference. 2005, 258–275
https://doi.org/10.1007/11535218_16
34 C Delerablée. Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2007, 200–215
https://doi.org/10.1007/978-3-540-76900-2_12
35 Y Zhu, X Wang, D, Ma R Guo. Identity-set-based broadcast encryption supporting cut-or-select with short ciphertext. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. 2015, 191–202
https://doi.org/10.1145/2714576.2714602
[1] FCS-0015-18320-EC_suppl_1 Download
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed