Skip to main content

SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC

  • Conference paper
  • First Online:
Provable and Practical Security (ProvSec 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14217))

Included in the following conference series:

Abstract

The homogeneous strong designated verifier signature scheme cannot meet the requirements of heterogeneous cryptography communication. With the idea of Heterogeneous Signcryption and strong designated verifier signature, we present a securely and mutually heterogeneous strong designated verifier signature (SMHSDVS) scheme between Public Key Infrastructure and Identity-based Cryptography, which has correctness, non-transferability, unforgeability, strongness, source hiding and non-delegatability. In addition, we use the Computational Diffie-Hellman model in oracle to analyze unforgeability and use mechanized tool CryptoVerif to analyze non-transferability. Finally, we evaluate the performance of heterogeneous digital signature scheme by compared with related schemes, and the results show that the proposed scheme is secure and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143–154. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9_13

    Chapter  Google Scholar 

  2. Sun, Y.X., Li, H.: Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci. China Inform. Sci. 53(3), 557–566 (2010). https://doi.org/10.1007/s11432-010-0061-5

    Article  MathSciNet  MATH  Google Scholar 

  3. Li, F., Zhang, H., Takagi, T.: Efficient signcryption for heterogeneous systems. IEEE Syst. J. 7(3), 420–429 (2013)

    Article  Google Scholar 

  4. Zhang, Y., Zhang, L., Zhang, Y., Wang, H., Wang, C.: CLPKC to TPKI heterogeneous signature scheme with Anonymity. Acta Electron. Sin. 44(10), 2432–2439 (2016)

    Google Scholar 

  5. Wang, C., Li, Y., Zhang, Y., Niu, S.: Efficient Signcryption scheme under the Standard Model. J. Electron. Inf. Technol. 39(4), 881–886 (2017)

    Google Scholar 

  6. Zhang, Y., Zhang, L., Wang, C., Ma, Y., Zhang, Y.: Provable secure IDPKC-to-CLPKC hetero-geneous signcryption scheme. Electron. Inf. Technol 39(9), 2127–2133 (2017)

    Google Scholar 

  7. Wang, C., Liu, C., Li, Y., Niu, S., Zhang, Y.: Bidirectional anonymous heterogeneous signature scheme based on PKI and IBC. J. Commun. 38(10), 10–17(2017). https://doi.org/10.11959/J.issn.1000-436x.2017194

  8. Liu, J., Zhang, L., Sun, R., Du, X., Guizani, M.: Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings. IEEE Access 1–1(6), 7854–7863 (2018). https://doi.org/10.1109/Access.2018.2797102

    Article  Google Scholar 

  9. Cao, S., Lang, X., Liu, X., Wang, C., Zhang, Y.: Improvement of a Verifiable and secure bidirec-tional anonymous heterogeneous signature scheme for PKI and IBC. J. Electron. Inf. Technol. 41(8), 1787–1792 (2019)

    Google Scholar 

  10. Xiong, H., Wu, Y., Jin, C., et al.: Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT. IEEE Internet Things J. 7(12), 11713–11724 (2020)

    Google Scholar 

  11. Yang, X., Zhang, Y., Deng, Z.: Research on trusted Two-Dimensional Code Technology based on PKI. Sci. Technol. Innov. Appl. 33, 89–90 (2015)

    Google Scholar 

  12. Sun, S.: A random individual digital signature authentication scheme. Inform. Security Technol. 6(7), 29–30+37 (2015)

    Google Scholar 

  13. Zhen, P., Zhao, G., Min, L., Li, X.: A forward secure digital Signature scheme based on identity. Comput. Appl. Softw. 32(11), 295–298 (2015)

    Google Scholar 

  14. Zhang, J., Xiao, H., Wang, J.: Efficient identity based on RSA multiple digital signature. J. Chin. Comput. Syst. 9, 1978–1981 (2018)

    Google Scholar 

  15. Saeednia, S., Kremer, S., Markowitch, O.: An efficient strong designated verifier signature scheme. In: Lim, J.-I., Lee, D.-H. (eds.) Information Security and Cryptology - ICISC 2003, pp. 40–54. Springer, Berlin, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24691-6_4

    Chapter  Google Scholar 

  16. Pankaj, S., Amitabh, B.: Strong designated verifier signature scheme based on discrete logarithm problem. J. Discr. Math. Sci. Crypt. 18(6), 877–885 (2015)

    MathSciNet  MATH  Google Scholar 

  17. Xu, D., Yu, B.: A secure identity-based strongly specified verifier signature scheme. Comput. Sci. 43(4), 50–52+57 (2016)

    Google Scholar 

  18. Du, H., Wen, Q.: Multi signature based on Certificateless strong designated verifier. J. Commun. 37(6), 20–28 (2016)

    Google Scholar 

  19. Shooshtari, M.K., Ahmadian-Attari, M., Aref, M.R.: Provably secure strong designated verifier signature scheme based on coding theory. Int. J. Commun. Syst. 30(7), e3162 (2017)

    Google Scholar 

  20. Yue, F.: Research on efficient signature system of designated verifier and its application. University of Electronic Science and Technology (2016)

    Google Scholar 

  21. Ge, L.: Study on Strong Designated Verifier signature scheme. Xihua Universit (2017)

    Google Scholar 

  22. Yu, Z., Feng, H., Xu, H.: Strong designated verifier signature scheme based on identity in cloud storage of smart distribution network. Comput. Digital Eng. 46(10), 2042–2046+2088 (2018)

    Google Scholar 

  23. Han, S., Xie, M., Yang, B., et al.: A certificateless verifiable strong designated verifier signature scheme. IEEE Access 7, 126391–126408 (2019)

    Article  Google Scholar 

  24. Nayak, B.: Elliptic curve cryptography-based signcryption scheme with a strong designated verifier for the internet. Mach. Learn. Inform. Process.: Proc. ICMLIP 2020(1101), 485 (2019)

    Google Scholar 

  25. Lin, H.Y., Tsai, T.T., Ting, P.Y., et al.: An efficient strong designated multi-verifier signature scheme with shared verification[J]. Int. J. Technol. Eng. Stud. 7(1), 10–16 (2021)

    Google Scholar 

  26. Parvin, R., Mehdi, B., Mohammad, D., Willy, S.: Universal designated verifier signature scheme with non-delegatability in the standard model. Inf. Sci. 479, 321–334 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  27. Zhang, Y., Xin, X., Li, F.: Secure and efficient quantum designated verifier signature scheme. Modern Phys. Lett. A, 35(18), 2050148 (2020). https://doi.org/10.1142/S0217732320501485

  28. Xin, X., Ding, L., Li, C., et al.: Quantum public-key designated verifier signature. Quantum Inf. Process. 21(1), 1–16 (2022)

    Article  MathSciNet  MATH  Google Scholar 

  29. Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 390–399 (2006)

    Google Scholar 

  30. Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281–308 (1988). https://doi.org/10.1137/0217017

    Article  MathSciNet  MATH  Google Scholar 

Download references

Funding

This work was supported in part by the National key R &D Program of China No. 2020YFC1522900; the Fundamental Research Funds for the Central Universities No.CZZ21001 and No. QSZ17007; and natural science founda- tion of Hubei Province under the grants No. 2018ADC150.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Meng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y., Wang, X., Huang, Ct., Wang, D., Ma, B., Meng, B. (2023). SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC. In: Zhang, M., Au, M.H., Zhang, Y. (eds) Provable and Practical Security. ProvSec 2023. Lecture Notes in Computer Science, vol 14217. Springer, Cham. https://doi.org/10.1007/978-3-031-45513-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-45513-1_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-45512-4

  • Online ISBN: 978-3-031-45513-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics