Constructing strong designated verifier signatures from key encapsulation mechanisms

Borui Gong, Man Ho Au, Haiyang Xue

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

2 Citations (Scopus)

Abstract

A designated verifier signature (DVS) allows a signer to convince a verifier that a message has been endorsed in a way that the conviction cannot be transferred to any third party. This is achieved by the property that the signature can be generated by one of them. Since DVS is publicly verifiable, a valid DVS implies that the signature must be created by either the signer or the verifier. To enhance privacy of signers' identity, a strong DVS (SDVS) disallows public verification. In this paper, we investigate various aspects of SDVS with making two contributions. Firstly, we consider SDVS in the multi-user setting and propose two strengthened models, namely, multi-user and multi-user+. To illustrate the significance of our models, we show that it is possible to forge an SDVS when the attacker is given signatures from an honest signer to multiple dishonest verifiers. Secondly, we give a generic construction of SDVS from Key Encapsulation Mechanism (KEM) and Pseudorandom Function (PRF) in the standard model. Our generic construction is secure in the multi-user setting if the underlying KEM and PRF are secure. We also give instantiations based on DDH and LWE assumptions respectively.

Original languageEnglish
Title of host publicationProceedings of 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-19)
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages586-593
Number of pages8
ISBN (Electronic)9781728127767
DOIs
Publication statusPublished - Aug 2019
Event18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019 - Rotorua, New Zealand
Duration: 5 Aug 20198 Aug 2019

Conference

Conference18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019
Country/TerritoryNew Zealand
CityRotorua
Period5/08/198/08/19

Keywords

  • KEM
  • Post Quantum
  • SDVS
  • Signature
  • Standard Model

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Software
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Constructing strong designated verifier signatures from key encapsulation mechanisms'. Together they form a unique fingerprint.

Cite this