Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature
E CHEN1, Yan ZHU1(), Changlu LIN2,3, Kewei LV4
1. School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China 2. College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350117, China 3. Fujian Provincial Key Lab of Network Security & Cryptology, Fujian Normal University, Fuzhou 350007, China 4. Institute of Information Engineering, DCS Research Center, Chinese Academy of Sciences, Beijing 100093, China
In this paper we present a designated verifier-set signature (DVSS), in which the signer allows to designate many verifiers rather than one verifier, and each designated verifier can verify the validity of signature by himself. Our research starts from identity-based aggregator (IBA) that compresses a designated set of verifier’s identities to a constantsize random string in cryptographic space. The IBA is constructed by mapping the hash of verifier’s identity into zero or pole of a target curve, and extracting one curve’s point as the result of aggregation according to a specific secret. Considering the different types of target curves, these two IBAs are called as zeros-based aggregator and poles-based aggregator, respectively. Based on them, we propose a practical DVSS scheme constructed from the zero-pole cancellation method which can eliminate the same elements between zeros-based aggregator and poles-based aggregator. Due to this design, our DVSS scheme has some distinct advantages: (1) the signature supporting arbitrary dynamic verifiers extracted from a large number of users; and (2) the signature with short and constant length. We rigorously prove that our DVSS scheme satisfies the security properties: correctness, consistency, unforgeability and exclusivity.
M Jakobsson, K Sako, R Impagliazzo. Designated verifier proofs and their applications. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 1996, 143–154 https://doi.org/10.1007/3-540-68339-9_13
2
R Steinfeld, L, Bull H Wang, J Pieprzyk. Universal designated-verifier signatures. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2003, 523–542 https://doi.org/10.1007/978-3-540-40061-5_33
3
S Saeednia, S Kremer, O Markowitch. An efficient strong designated verifier signature scheme. In: Proceedings of International Conference on Information Security and Cryptology. 2003, 40–54 https://doi.org/10.1007/978-3-540-24691-6_4
4
C Y Ng, W Susilo, Y Mu. Universal designated multi verifier signature schemes. In: Proceedings of the 11th International Conference on Parallel and Distributed Systems. 2005, 305–309
5
G Shailaja, K P Kumar, A Saxena. Universal designated multi verifier signature without random oracles. In: Proceeding of the 9th International Conference on Information Technology. 2006, 168–171 https://doi.org/10.1109/ICIT.2006.86
6
T Y. ChangAn ID-based multi-signer universal designated multiverifier signature scheme. Information and Computation, 2011, 209(7): 1007–1015 https://doi.org/10.1016/j.ic.2011.03.002
7
B Libert, S Ling, K Nguyen, H Wang. Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2016, 1–31 https://doi.org/10.1007/978-3-662-49896-5_1
8
R Steinfeld, H Wang, J Pieprzyk. Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. In: Proceedings of International Workshop on Public Key Cryptography. 2004, 86–100 https://doi.org/10.1007/978-3-540-24632-9_7
9
B Kang, C Boyd, E Dawson. Identity-based strong designated verifier signature schemes: attacks and new construction. Computers and Electrical Engineering, 2009, 35(1): 49–53 https://doi.org/10.1016/j.compeleceng.2008.05.004
10
A U Khan, B K Ratha, S Mohanty. A timestamp-based strong designated verifier signature scheme for next-generation network security services. In: Bhatia S, Mishra K, Tiwari S, Singh V, eds. Advances in Computer and Computational Sciences. Springer, Singapore, 2017, 311–320 https://doi.org/10.1007/978-981-10-3770-2_29
11
W Susilo, F Zhang, Y Mu. Identity-based strong designated verifier signature schemes. In: Proceedings of the Australasian Conference on Information Security and Privacy. 2004, 313–324 https://doi.org/10.1007/978-3-540-27800-9_27
12
H Tian, X, Chen J. LiA short non-delegatable strong designated verifier signature. In: Proceedings of Australasian Conference on Information Security and Privacy. 2012, 261–279 https://doi.org/10.1007/978-3-642-31448-3_20
F Zhang, W Susilo, Y Mu, X. ChenIdentity-based universal designated verifier signatures. In: Proceedings of the 2005 International Conference on Embedded and Ubiquitous Computing. 2005, 825–834 https://doi.org/10.1007/11596042_85
N Sharma, R A Sahu, V, Saraswat B K Sharma. Adaptively secure strong designated signature. In: Proceedings of International Conference on Cryptology in India. 2016, 43–60 https://doi.org/10.1007/978-3-319-49890-4_3
18
F Laguillaumie, D Vergnaud. Multi-designated verifiers signatures. In: Proceedings of the 6th International Conference on Information and Communications Security. 2004, 495–507 https://doi.org/10.1007/978-3-540-30191-2_38
19
F Laguillaumie, D Vergnaud. Multi-designated verifiers signatures: anonymity without encryption. Information Processing Letters, 2007, 102(2–3): 127–132 https://doi.org/10.1016/j.ipl.2006.08.015
20
Y Ming, Y Wang. Universal designated multi verifier signature scheme without random oracles. Wuhan University Journal of Natural Sci ences, 2008, 13(6): 685–691 https://doi.org/10.1007/s11859-008-0610-6
21
S H Seo, J Y Hwang, K Y, Choi D H. Lee Identity-based universal designated multi-verifiers signature schemes. Computer Standards and Interfaces, 2008, 30(5): 288–295 https://doi.org/10.1016/j.csi.2007.08.020
22
C Lin, W Wu, X, Huang L Xu. A new universal designated verifier transitive signature scheme for big graph data. Journal of Computer and System Science, 2017, 83(1): 73–83 https://doi.org/10.1016/j.jcss.2016.06.003
23
Y Shi, H, Fan Q. LiuAn obfuscatable designated verifier signature scheme. IEEE Transactions on Emerging Topics in Computing, 2017, 5(2): 271–285 https://doi.org/10.1109/TETC.2017.2663765
24
Y Zhu, G, Gan R, Guo D. Huang PHE: an efficient traitor tracing and revocation for encrypted file syncing-and-sharing in cloud. IEEE Transactions on Cloud Computing, 2016, 6(4): 1110–1124 https://doi.org/10.1109/TCC.2016.2573299
25
Y Zhu, G J Ahn, H Hu, S S Yau. H G An, C Hu. Dynamic audit services for outsourced storages in clouds. IEEE Transactions on Services Computing, 2013, 6(2): 227–238 https://doi.org/10.1109/TSC.2011.51
26
D Boneh, M Franklin. Identity-based encryption from the weil pairing. In: Proceedings of Annual International Cryptology Conference. 2001, 213–229 https://doi.org/10.1007/3-540-44647-8_13
D Boneh, X Boyen. Short signatures without random oracles. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2004, 56–73 https://doi.org/10.1007/978-3-540-24676-3_4
29
J H Cheon. Security analysis of the strong Diffie-Hellman problem. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2006, 1–11 https://doi.org/10.1007/11761679_1
30
D Boneh, X Boyen, E J Goh. Hierarchical identity based encryption with constant size ciphertext. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2005, 440–456 https://doi.org/10.1007/11426639_26
31
D Pointcheval, J. SternSecurity arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13(3): 361–396 https://doi.org/10.1007/s001450010003
32
S Schechter, T Parnell, A Hartemink. Anonymous authentication of membership in dynamic groups. In: Proceedings of International Conference on Financial Cryptography. 1999, 184–195 https://doi.org/10.1007/3-540-48390-X_14
33
D Boneh, C Gentry, B Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Proceedings of Annual International Cryptology Conference. 2005, 258–275 https://doi.org/10.1007/11535218_16
34
C Delerablée. Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2007, 200–215 https://doi.org/10.1007/978-3-540-76900-2_12
35
Y Zhu, X Wang, D, Ma R Guo. Identity-set-based broadcast encryption supporting cut-or-select with short ciphertext. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. 2015, 191–202 https://doi.org/10.1145/2714576.2714602