On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear Pairings
Title | On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear Pairings |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Lin, Han-Yu, Ting, Pei-Yih, Yang, Leo-Fan |
Conference Name | Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5315-1 |
Keywords | certificateless, composability, compositionality, cryptanalysis, digital signature, digital signatures, Metrics, provable security, pubcrawl, resilience, Resiliency, signer ambiguity, strong designated verifier |
Abstract | A strong designated verifier signature (SDVS) is a variation of traditional digital signatures, since it allows a signer to designate an intended receiver as the verifier rather than anyone. To do this, a signer must incorporate the verifier's public key with the signing procedure such that only the intended receiver could verify this signature with his/her private key. Such a signature further enables a designated verifier to simulate a computationally indistinguishable transcript intended for himself. Consequently, no one can identify the real signer's identity from a candidate signer and a designated verifier, which is referred to as the property of signer ambiguity. A strong notion of signer ambiguity states that no polynomial-time adversary can distinguish the real signer of a given SDVS that is not received by the designated verifier, even if the adversary has obtained the signer's private key. In 2013, Islam and Biswas proposed a provably secure certificateless strong designated verifier signature (CL-SDVS) scheme based on bilinear pairings. In this paper, we will demonstrate that their scheme fails to satisfy strong signer ambiguity and must assume a trusted private key generator (PKG). In other words, their CL-SDVS scheme is vulnerable to both key-compromise and malicious PKG attacks. Additionally, we present an improved variant to eliminate these weaknesses. |
URL | https://dl.acm.org/citation.cfm?doid=3145777.3145784 |
DOI | 10.1145/3145777.3145784 |
Citation Key | lin_security_2017 |