Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.5.37

Exact Security Analysis of Some Designated Verifier Signature Schemes With Defective Security Proof  

Kim, Ki-Tae (INHA University)
Nyang, Dae-Hun (INHA University)
Lee, Kyung-Hee (The University of Suwon)
Abstract
Designated verifier signatures allow a signer to prove the validity of a signature to a specifically designated verifier. The designated verifier can be convinced but unable to prove the source of the message to a third party. Unlike conventional digital signatures, designated verifier signatures make it possible for a signer to repudiate his/her signature against anyone except the designated verifier. Recently, two designated verifier signature schemes, Zhang et al.'s scheme and Kang et al.'s scheme, have been shown to be insecure by concrete attacks. In this paper, we find the essential reason that the schemes open attacks while those were given with its security proofs, and show that Huang-Chou scheme and Du-Wen scheme have the same problem. Indeed, the security proofs of all the schemes reflect no message attackers only. Next, we show that Huang-Chou scheme is insecure by presenting universal forgery attack. Finally, we show that Du-Wen scheme is, indeed, secure by completing its defective security proof.
Keywords
Digital signature; designated verifier signature; cryptanalysis;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Pointcheval, J. Stern, "Security arguments for digital signatures and blind signatures," Journal of Cryptology, Vol. 13, No. 3, Springer-Verlag, pp. 361-396, 2000.   DOI   ScienceOn
2 S. Saeednia, S. Kremer, and O. Markovitch, "An efficient strong designated verifier signature scheme," In ICISC 2003, LNCS 2869, Springer-Verlag, pp. 40-54, 2003.
3 W. Susilo, F. Zhang, and Y. Mu, "Identity- based strong designated verifier signature scheme," In ACISP 2004, LNCS 3108, Springer-Verlag, pp. 313-324, 2004.
4 J. Zhang and J. Mao, "A novel ID-based designated verifier signature scheme," Information Sciences, Volume 178, Issue 3, pp. Elsevier, 766-773, 2008.   DOI   ScienceOn
5 X. Huang, W. Susilo, Y. Mu, and F. Zhang, "Short designated verifier signature scheme and its identity-based variants," International Journal of Network Security, Vol. 6, No. 1, pp. 82-93, Jan. 2008.
6 X. Huang, W. Susilo, Y. Mu and F. Zhang, "Short (identity-based) designated verifier signature schemes," ISPEC 2006, LNCS 3903, Springer-Verlag, pp. 214- 225, 2006.
7 M. Jakobsson, K. Sako and R. Impagliazzo, "Designated Verifier Proofs and Their Applications," Eurocrypt'96, LNCS 1070, Springer-Verlag, pp. 142-154, 1996.
8 K. Kumar, G. Shailaja and A. Saxena, "Identity based strong designated verifier signature scheme", IACR ePrint 2006- 134, 2006.
9 B. Kang, C. Boyd and Ed Dawson, "Identity-based strong designated verifier signature schemes: Attacks and new construction," Computers & Electrical Engineering, Volume 35, Issue 1, Elsevier, pp. 49-53, 2009.   DOI   ScienceOn
10 B. Kang, C. Boyd and Ed Dawwon, "A novel identity-based strong designated verifier signature scheme," Journal of Systems and Software, Volume 82, Issue 2, Elsevier, pp. 270-273, 2009.   DOI   ScienceOn
11 D. Chaum, "Private signature and proof systems?, US Patent, No. 5493614, 1996.
12 H. Du and Q. Wen, "Attack on Kang et al.'s Identity-based strong designated verifier signature scheme," IACR ePrint 2008-297, 2008.
13 F. Hess, "Efficient identity based signature schemes based on pairing," SAC 2002, LNCS 2595, Springer-Verlag, pp. 310-324, 2002.
14 H. Huang and J. Chou, "A provably secure really source hiding designated verifier signature scheme based on random oracle model," IACR ePrint 2009-348, 2009.
15 M. Bellare and A. Palacio, "GQ and Schnorr Identification Schemes: Proofs and Security against Impersonation under Active and Concurrent Attacks," Crypto'02, LNCS 2442, Springer-Verlag, pp. 162-177, 2002.
16 J.C. Cha and J.H. Cheon, "An identity- based signature from gap Diffie- Hellman groups," PKC'03, LNCS 2567, Springer-Verlag, pp. 18-30, 2003.
17 D. Chaum and H. van Antwerpen, "Undeniable signature," Crypto'89, LNCS 485, Springer-Verlag, pp. 212-216, 1990.