Computer Science ›› 2013, Vol. 40 ›› Issue (7): 126-128.

Previous Articles     Next Articles

Security Analysis and Improvement of Certificateless Strong Designated Verifier Signature Scheme

LIU Tang,WANG Xiao-fen and DING Xue-feng   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Hafizul Islam SK and G.P.Biswas recently proposed a certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairing,and claimed their scheme satisfies provable security against three types of adversaries,including the type 1adversary who only learns the system public parameters,the type 2adversary who can’t obtain the private key of the user and the system master key,but can replace the user’s public key,and the type 3adversary who has obtained the system master key.However,this paper pointed out their signature scheme is actually not secure as claimed by presenting an attack launched by an adversary who has learned the system master key.Furthermore,to make up this flaw,we also provided an revised certificateless strong designated verifier signature scheme in which the verifier’s partial private key generated by himself is included in the computation of the verification procedure,thus above attack can be efficiently resisted.

Key words: Certificateless public key cryptosystem,Strong designated verifier signature,Bilinear pairing

[1] Diffie W,Hellman M.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654
[2] Shamir A.Identity based cryptosystems and signature scheme[C]∥Crypto 1984,LNCS.vol.196,Springer-Verlag,1984:47-53
[3] Miller V S.Use of elliptic curves in cryptography[C]∥Procee-ding of the Crypto’85.New York:Springer-Verlag,1985:417-426
[4] Koblitz N.Elliptic curve cryptosystem[J].Journal of Mathema-tics of Computation,1987,48(177):203-209
[5] Boneh D,Franklin M K.Identity-based encryption from the Weil pairing[C]∥Proceedings of the Crypto’01,LNCS.vol.2139,Springer-Verlag,2001:213-229
[6] Al-Riyami S,Paterson K.Certificateless public key cryptography[C]∥Proceedings of the Asiacrypt’03,LNCS.vol.2894,Springer-Verlag,2003:452-473
[7] Jakobsson M,Sako K,Impagliazzo R.Designated verifier proofs and their applications[C]∥Proceedings of the Eurocrypt’96,LNCS.vol.1070,Springer-Verlag,1996:143-154
[8] Yang M,Shem X-Q,Wang Y-M.Certificateless universal designated verifier signature scheme[J].The Journal of China Universities of Posts and Telecommunications,2007,14(3):85-94
[9] Guozheng H,Fan H.Attacks against two provably secure certifi-cateless signature schemes[C]∥Proceedings of the WASE International Conference on Information Engineering.2009:246-249
[10] Huang X,Susilo W,Mu Y,et al.Certificateless designated verifier signature schemes[C]∥Proceedings of the 20th International Conference on AINA’06.vol.2,2006:15-19
[11] Du H,Wen Q.Efficient and provably-secure certificateless short signature scheme from bilinear pairings.Cryptology ePrint Archive[R].Report 2007/250
[12] Chen H,Song R,Zhang F,et al.An efficient certificateless short designated verifier signature scheme[C]∥Proceedings of the International Conference on WiCOM’08.Dalian,2008:1-6
[13] Fan C-I,Hsu R-H,Ho P-H.Cryptanalysis on Du-Wen certifi-cateless short signature scheme[C]∥Proceedings of the JWIS’09,Institute of Electrical and Electronics Engineers.Kaohsiung,2009:1-7
[14] Tso R,Yi X,Huang X.Efficient and short certificateless signatures secure against realistic adversaries[J].Journal of Supercomputer,2011,55:173-191
[15] Choi K Y,Park J H,Lee D H.A new provably secure certificateless short signature scheme[J].Computers and Mathematics with Applications,2011,61(7):1760-1768
[16] Tian M,Huang L,Yang W.On the security of a certificateless short signature scheme.Cryptology ePrint Archive.http://eprint.iacr.org/2011/419,2011
[17] Hafizul Islam S K,Biswas G P.Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings[J].Journal of King Saud University-Computer and Information Sciences,2013,25(1):51-61
[18] Boneh D,Lynn B,Shacham H.Short Signature from the Weil Paring[C]∥Proceeding of Asiacrypt’01,LNCS 2248.Springer-Verlag,2001:514-532

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!