Strong Designated Verifier Signature Scheme Resisting Replay Attack
DOI:
https://doi.org/10.5755/j01.itc.44.2.7625Keywords:
strong designated verifier signature, message recover, time stamp, replay attack.Abstract
Strong designated verifier signature shows that only designated user can verify the validity of the signature, others who have not signer’s secret key or verifier’s secret key cannot judge the signature’s originator. Lee et al. presented a designated verifier signature scheme to realize signature’s verification in the limited time. We demonstrate that Lee et al.’s scheme was insecure, and other legal user can forge valid signatures which convince designated verifier. In this paper, we show a concrete forgery attack to Lee et al.’s scheme and propose a new strong designated verifier signature scheme with time limit. In our new scheme, the message and time stamp need not transmit publicly, which were embedded in signature via the method of message recovery, only singer and designated verifier can recover these secrete values. Based on the Bilinear Diffie-Hellman problem and Pre-Image Resistance assumption, it is proved that our new strong designated verifier signature scheme can resist the ordinary forgery attack and replay attack, and enforce signature verification with time limit.
Downloads
Published
Issue
Section
License
Copyright terms are indicated in the Republic of Lithuania Law on Copyright and Related Rights, Articles 4-37.