File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Constructing strong designated verifier signatures from key encapsulation mechanisms

TitleConstructing strong designated verifier signatures from key encapsulation mechanisms
Authors
KeywordsSignature
Post Quantum
KEM
Standard Model
SDVS
Issue Date2019
Citation
Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019, 2019, p. 586-593 How to Cite?
Abstract© 2019 IEEE. A designated verifier signature (DVS) allows a signer to convince a verifier that a message has been endorsed in a way that the conviction cannot be transferred to any third party. This is achieved by the property that the signature can be generated by one of them. Since DVS is publicly verifiable, a valid DVS implies that the signature must be created by either the signer or the verifier. To enhance privacy of signers' identity, a strong DVS (SDVS) disallows public verification. In this paper, we investigate various aspects of SDVS with making two contributions. Firstly, we consider SDVS in the multi-user setting and propose two strengthened models, namely, multi-user and multi-user+. To illustrate the significance of our models, we show that it is possible to forge an SDVS when the attacker is given signatures from an honest signer to multiple dishonest verifiers. Secondly, we give a generic construction of SDVS from Key Encapsulation Mechanism (KEM) and Pseudorandom Function (PRF) in the standard model. Our generic construction is secure in the multi-user setting if the underlying KEM and PRF are secure. We also give instantiations based on DDH and LWE assumptions respectively.
Persistent Identifierhttp://hdl.handle.net/10722/280714
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorGong, Borui-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorXue, Haiyang-
dc.date.accessioned2020-02-17T14:34:45Z-
dc.date.available2020-02-17T14:34:45Z-
dc.date.issued2019-
dc.identifier.citationProceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019, 2019, p. 586-593-
dc.identifier.urihttp://hdl.handle.net/10722/280714-
dc.description.abstract© 2019 IEEE. A designated verifier signature (DVS) allows a signer to convince a verifier that a message has been endorsed in a way that the conviction cannot be transferred to any third party. This is achieved by the property that the signature can be generated by one of them. Since DVS is publicly verifiable, a valid DVS implies that the signature must be created by either the signer or the verifier. To enhance privacy of signers' identity, a strong DVS (SDVS) disallows public verification. In this paper, we investigate various aspects of SDVS with making two contributions. Firstly, we consider SDVS in the multi-user setting and propose two strengthened models, namely, multi-user and multi-user+. To illustrate the significance of our models, we show that it is possible to forge an SDVS when the attacker is given signatures from an honest signer to multiple dishonest verifiers. Secondly, we give a generic construction of SDVS from Key Encapsulation Mechanism (KEM) and Pseudorandom Function (PRF) in the standard model. Our generic construction is secure in the multi-user setting if the underlying KEM and PRF are secure. We also give instantiations based on DDH and LWE assumptions respectively.-
dc.languageeng-
dc.relation.ispartofProceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019-
dc.subjectSignature-
dc.subjectPost Quantum-
dc.subjectKEM-
dc.subjectStandard Model-
dc.subjectSDVS-
dc.titleConstructing strong designated verifier signatures from key encapsulation mechanisms-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TrustCom/BigDataSE.2019.00084-
dc.identifier.scopuseid_2-s2.0-85075144829-
dc.identifier.spage586-
dc.identifier.epage593-
dc.identifier.isiWOS:000567324100071-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats