One-move convertible nominative signature in the standard model

被引:0
作者
Liu, Dennis Y. W. [1 ,2 ]
Wong, Duncan S. [2 ]
机构
[1] Univ Hong Kong, Sch Profess & Continuing Educ, Hong Kong, Hong Kong, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
nominative signature; undeniable signature; non-self-authenticating signature; generic construction; RANDOM ORACLES; KNOWLEDGE; SECURITY;
D O I
10.1002/sec.812
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A nominative signature (NS) is a non-self-authenticating signature that is jointly generated by a signer (or a nominator) and a user (or a nominee), but once generated, its validity can only be determined by the user. No one else including the signer can tell the signature's validity unless the user confirms or disavows so, whereas the user cannot cheat either. One-move NS is an efficient type of NS that requires the signer to send only one message to the user during the signature generation stage. Currently, there exists only one one-move NS scheme that is proven secure in the standard model, and is convertible, that is, the user can transform a nominative signature to a publicly verifiable standard signature without the signer's aid. However, the number of elements in the keys of both signer and user grows linearly with the value of the security parameter. In this paper, we propose a new one-move NS which is convertible, can be proven secure in the standard model, and also has a constant number of elements in the keys of both the signer and the user. We apply the Boneh-Boyen short standard signature in a novel way to build this nominative signature scheme. We show that this new scheme achieves the best performance among all the schemes proven secure in the standard model, and its security relies only on the standard q-strong Diffie-Hellman and decisional Diffie-Hellman assumptions. Finally, we will present a generic construction by utilizing a secure standard signature scheme and a secure encryption scheme. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1796 / 1809
页数:14
相关论文
共 35 条
[21]   Highly efficient strong designated verifier signature schemes in the standard model [J].
Hu, Xiaoming ;
Huo, Xin ;
Yang, Yinchun ;
Wang, Jian .
2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, :316-320
[22]   Certificate-Based Key-Insulated Signature in the Standard Model [J].
Li, Jiguo ;
Du, Haiting ;
Zhang, Yichen .
COMPUTER JOURNAL, 2016, 59 (07) :1028-1039
[23]   A Lightweight Certificateless Aggregation Signature Scheme With Provably Security in the Standard Model [J].
Deng, Lunzhi ;
Ning, Bingqin ;
Jiang, Yuhong .
IEEE SYSTEMS JOURNAL, 2020, 14 (03) :4242-4251
[24]   New Identity-Based Identification and Signature Schemes in the Standard Model [J].
Tan, Syh-Yuan ;
Heng, Swee-Huay .
18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
[25]   Synchronized Aggregate Signature Under Standard Assumption in the Random Oracle Model [J].
Kabaleeshwaran, R. ;
Sai, Panuganti Venkata Shanmukh .
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2023, PT I, 2024, 14459 :197-220
[26]   An identity based universal designated verifier signature scheme secure in the standard model [J].
Cao, Feng ;
Cao, Zhenfu .
JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (04) :643-649
[27]   Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model [J].
Rao, Y. Sreenivasa ;
Dutta, Ratna .
INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 :209-225
[28]   A generic construction of identity-based proxy signature scheme in the standard model [J].
Hu X. ;
Xu H. ;
Wang J. ;
Tan W. ;
Yang Y. .
International Journal of Information and Computer Security, 2019, 11 (01) :83-100
[29]   Efficient one-round key exchange in the standard model [J].
Boyd, Colin ;
Cliff, Yvonne ;
Nieto, Juan Gonzalez ;
Paterson, Kenneth C. .
INFORMATION SECURITY AND PRIVACY, 2008, 5107 :69-+
[30]   A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs [J].
Wang, Huiwen ;
Wang, Liangliang ;
Zhang, Kai ;
Li, Jinguo ;
Luo, Yiyuan .
IEEE ACCESS, 2022, 10 :15605-15618