Visible to the public On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear Pairings

TitleOn the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear Pairings
Publication TypeConference Paper
Year of Publication2017
AuthorsLin, Han-Yu, Ting, Pei-Yih, Yang, Leo-Fan
Conference NameProceedings of the 2017 International Conference on Telecommunications and Communication Engineering
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5315-1
Keywordscertificateless, composability, compositionality, cryptanalysis, digital signature, digital signatures, Metrics, provable security, pubcrawl, resilience, Resiliency, signer ambiguity, strong designated verifier
Abstract

A strong designated verifier signature (SDVS) is a variation of traditional digital signatures, since it allows a signer to designate an intended receiver as the verifier rather than anyone. To do this, a signer must incorporate the verifier's public key with the signing procedure such that only the intended receiver could verify this signature with his/her private key. Such a signature further enables a designated verifier to simulate a computationally indistinguishable transcript intended for himself. Consequently, no one can identify the real signer's identity from a candidate signer and a designated verifier, which is referred to as the property of signer ambiguity. A strong notion of signer ambiguity states that no polynomial-time adversary can distinguish the real signer of a given SDVS that is not received by the designated verifier, even if the adversary has obtained the signer's private key. In 2013, Islam and Biswas proposed a provably secure certificateless strong designated verifier signature (CL-SDVS) scheme based on bilinear pairings. In this paper, we will demonstrate that their scheme fails to satisfy strong signer ambiguity and must assume a trusted private key generator (PKG). In other words, their CL-SDVS scheme is vulnerable to both key-compromise and malicious PKG attacks. Additionally, we present an improved variant to eliminate these weaknesses.

URLhttps://dl.acm.org/citation.cfm?doid=3145777.3145784
DOI10.1145/3145777.3145784
Citation Keylin_security_2017