Provably Secure and Pairing-Based Strong Designated Verifier Signature Scheme with Message Recovery

被引:0
作者
SK Hafizul Islam
G. P. Biswas
机构
[1] Birla Institute of Technology and Science,Department of Computer Science and Information Systems
[2] Indian School of Mines,Department of Computer Science and Engineering
来源
Arabian Journal for Science and Engineering | 2015年 / 40卷
关键词
Elliptic curve cryptography; Designated verifier; Message recovery; Co-Bilinear Diffie–Hellman assumption; Provable security;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, an efficient and secure strong designated verifier signature with message recovery scheme is presented using elliptic curve and bilinear pairing. In our scheme, the signer implants a message on the signature and sends it without message to the verifier, who then extracts the original message and validates the message-signature pair. However, an outsider is unable to verify the message-signature pair since the verifier’s private key is strictly required for verification. Our scheme has been designed to achieve confidentiality, integrity, authentication and non-repudiation of message transmitted through hostile networks. Our scheme is secure against adaptive chosen message attack in the random oracle model under the intractability assumption of Co-Bilinear Diffie–Hellman problem. Besides, our scheme is computation and communication efficient than other schemes, and hence, it may be useful in many small message applications and also for the resource-constrained environments.
引用
收藏
页码:1069 / 1080
页数:11
相关论文
共 42 条
[1]  
Koblitz N.(1987)Elliptic curve cryptosystem J. Math. Comput. 48 203-209
[2]  
Boneh D.(2003)Identity-based encryption from the Weil pairing SIAM J. Comput. 32 586-615
[3]  
Franklin M.K.(2001)Short signatures from the Weil pairing J. Cryptol. 17 297-319
[4]  
Boneh D.(2008)A novel ID-based designated verifier signature scheme Inf. Sci. 178 766-773
[5]  
Lynn B.(2009)Identity-based strong designated verifier signature schemes: attacks and new construction Comput. Electr. Eng. 35 49-53
[6]  
Shacham H.(2010)Forgery attacks on Kang et al.’s identity-based strong designated verifier signature scheme and its improvement with security proof Comput. Electr. Eng. 36 948-954
[7]  
Zhang J.(2009)A novel identity-based strong designated verifier signature scheme J. Syst. Softw. 82 270-273
[8]  
Mao J.(2011)Identity-based strong designated verifier signature revisited J. Syst. Softw. 84 120-129
[9]  
Kang B.(2004)Digital signature with message recovery and its variant based on elliptic curve discrete logarithm problem Comput. Stand. Interfaces 26 61-71
[10]  
Boyd C.(2009)Comment on Saeednia et al.’s strong designated verifier signature scheme Comput. Stand. Interfaces 31 258-260