Constructing strong designated verifier signatures from key encapsulation mechanisms
A designated verifier signature (DVS) allows a signer to convince a verifier that a message has been endorsed in a way that the conviction cannot be transferred to any third party. This is achieved by the property that the signature can be generated by one of them. Since DVS is publicly verifiable,...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2019
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/9184 https://ink.library.smu.edu.sg/context/sis_research/article/10189/viewcontent/277700a586.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-10189 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-101892024-08-13T05:22:38Z Constructing strong designated verifier signatures from key encapsulation mechanisms GONG, Borui AU, Ho Man XUE, Haiyang A designated verifier signature (DVS) allows a signer to convince a verifier that a message has been endorsed in a way that the conviction cannot be transferred to any third party. This is achieved by the property that the signature can be generated by one of them. Since DVS is publicly verifiable, a valid DVS implies that the signature must be created by either the signer or the verifier. To enhance privacy of signers' identity, a strong DVS (SDVS) disallows public verification. In this paper, we investigate various aspects of SDVS with making two contributions. Firstly, we consider SDVS in the multi-user setting and propose two strengthened models, namely, multi-user and multi-user+. To illustrate the significance of our models, we show that it is possible to forge an SDVS when the attacker is given signatures from an honest signer to multiple dishonest verifiers. Secondly, we give a generic construction of SDVS from Key Encapsulation Mechanism (KEM) and Pseudorandom Function (PRF) in the standard model. Our generic construction is secure in the multi-user setting if the underlying KEM and PRF are secure. We also give instantiations based on DDH and LWE assumptions respectively. 2019-08-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9184 info:doi/10.1109/trustcom/bigdatase.2019.00084 https://ink.library.smu.edu.sg/context/sis_research/article/10189/viewcontent/277700a586.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Signature SDVS Standard Model KEM PostQuantu Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Signature SDVS Standard Model KEM PostQuantu Information Security |
spellingShingle |
Signature SDVS Standard Model KEM PostQuantu Information Security GONG, Borui AU, Ho Man XUE, Haiyang Constructing strong designated verifier signatures from key encapsulation mechanisms |
description |
A designated verifier signature (DVS) allows a signer to convince a verifier that a message has been endorsed in a way that the conviction cannot be transferred to any third party. This is achieved by the property that the signature can be generated by one of them. Since DVS is publicly verifiable, a valid DVS implies that the signature must be created by either the signer or the verifier. To enhance privacy of signers' identity, a strong DVS (SDVS) disallows public verification. In this paper, we investigate various aspects of SDVS with making two contributions. Firstly, we consider SDVS in the multi-user setting and propose two strengthened models, namely, multi-user and multi-user+. To illustrate the significance of our models, we show that it is possible to forge an SDVS when the attacker is given signatures from an honest signer to multiple dishonest verifiers. Secondly, we give a generic construction of SDVS from Key Encapsulation Mechanism (KEM) and Pseudorandom Function (PRF) in the standard model. Our generic construction is secure in the multi-user setting if the underlying KEM and PRF are secure. We also give instantiations based on DDH and LWE assumptions respectively. |
format |
text |
author |
GONG, Borui AU, Ho Man XUE, Haiyang |
author_facet |
GONG, Borui AU, Ho Man XUE, Haiyang |
author_sort |
GONG, Borui |
title |
Constructing strong designated verifier signatures from key encapsulation mechanisms |
title_short |
Constructing strong designated verifier signatures from key encapsulation mechanisms |
title_full |
Constructing strong designated verifier signatures from key encapsulation mechanisms |
title_fullStr |
Constructing strong designated verifier signatures from key encapsulation mechanisms |
title_full_unstemmed |
Constructing strong designated verifier signatures from key encapsulation mechanisms |
title_sort |
constructing strong designated verifier signatures from key encapsulation mechanisms |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2019 |
url |
https://ink.library.smu.edu.sg/sis_research/9184 https://ink.library.smu.edu.sg/context/sis_research/article/10189/viewcontent/277700a586.pdf |
_version_ |
1814047784646475776 |