(Strong) multidesignated verifiers signatures secure against rogue key attack

Designated verifier signatures (DVS) allow a signer to create a signature whose validity can only be verified by a specific entity chosen by the signer. In addition, the chosen entity, known as the designated verifier, cannot convince any body that the signature is created by the signer. Multi-desig...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG, Yunmei, AU, Man Ho, YANG, Guomin, SUSILO, Willy
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2012
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7344
https://ink.library.smu.edu.sg/context/sis_research/article/8347/viewcontent/LNCS_7645___Network_and_System_Security.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8347
record_format dspace
spelling sg-smu-ink.sis_research-83472022-10-06T02:25:41Z (Strong) multidesignated verifiers signatures secure against rogue key attack ZHANG, Yunmei AU, Man Ho YANG, Guomin SUSILO, Willy Designated verifier signatures (DVS) allow a signer to create a signature whose validity can only be verified by a specific entity chosen by the signer. In addition, the chosen entity, known as the designated verifier, cannot convince any body that the signature is created by the signer. Multi-designated verifiers signatures (MDVS) are a natural extension of DVS in which the signer can choose multiple designated verifiers. DVS and MDVS are useful primitives in electronic voting and contract signing. In this paper, we investigate various aspects of MDVS and make two contributions. Firstly, we revisit the notion of unforgeability under rogue key attack on MDVS. In this attack scenario, a malicious designated verifier tries to forge a signature that passes through the verification of another honest designated verifier. A common counter-measure involves making the knowledge of secret key assumption (KOSK) in which an adversary is required to produce a proof-of-knowledge of the secret key. We strengthened the existing security model to capture this attack and propose a new construction that does not rely on the KOSK assumption. Secondly, we propose a generic construction of strong MDVS 2012-11-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7344 info:doi/10.1002/cpe.3094 https://ink.library.smu.edu.sg/context/sis_research/article/8347/viewcontent/LNCS_7645___Network_and_System_Security.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University designated verifier signature public key cryptography rogue key attack Information Security OS and Networks
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic designated verifier signature
public key cryptography
rogue key attack
Information Security
OS and Networks
spellingShingle designated verifier signature
public key cryptography
rogue key attack
Information Security
OS and Networks
ZHANG, Yunmei
AU, Man Ho
YANG, Guomin
SUSILO, Willy
(Strong) multidesignated verifiers signatures secure against rogue key attack
description Designated verifier signatures (DVS) allow a signer to create a signature whose validity can only be verified by a specific entity chosen by the signer. In addition, the chosen entity, known as the designated verifier, cannot convince any body that the signature is created by the signer. Multi-designated verifiers signatures (MDVS) are a natural extension of DVS in which the signer can choose multiple designated verifiers. DVS and MDVS are useful primitives in electronic voting and contract signing. In this paper, we investigate various aspects of MDVS and make two contributions. Firstly, we revisit the notion of unforgeability under rogue key attack on MDVS. In this attack scenario, a malicious designated verifier tries to forge a signature that passes through the verification of another honest designated verifier. A common counter-measure involves making the knowledge of secret key assumption (KOSK) in which an adversary is required to produce a proof-of-knowledge of the secret key. We strengthened the existing security model to capture this attack and propose a new construction that does not rely on the KOSK assumption. Secondly, we propose a generic construction of strong MDVS
format text
author ZHANG, Yunmei
AU, Man Ho
YANG, Guomin
SUSILO, Willy
author_facet ZHANG, Yunmei
AU, Man Ho
YANG, Guomin
SUSILO, Willy
author_sort ZHANG, Yunmei
title (Strong) multidesignated verifiers signatures secure against rogue key attack
title_short (Strong) multidesignated verifiers signatures secure against rogue key attack
title_full (Strong) multidesignated verifiers signatures secure against rogue key attack
title_fullStr (Strong) multidesignated verifiers signatures secure against rogue key attack
title_full_unstemmed (Strong) multidesignated verifiers signatures secure against rogue key attack
title_sort (strong) multidesignated verifiers signatures secure against rogue key attack
publisher Institutional Knowledge at Singapore Management University
publishDate 2012
url https://ink.library.smu.edu.sg/sis_research/7344
https://ink.library.smu.edu.sg/context/sis_research/article/8347/viewcontent/LNCS_7645___Network_and_System_Security.pdf
_version_ 1770576316059353088