designated-verifier chameleon proxy...

2
Designated-Verifier Chameleon Proxy Signature JIANHONG ZHANG, CHENG JI, and QIN GENG North China University of Technology, Shijingshan District, Beijing, China With the development of computer technology, the requirement of the methods to verify the authenticity, the validity, and the integrity of information is becoming much bigger. For this purpose, many methods have been generated, such as digital signature, digital watermarking, steganography, and so on. Digital signature is a hot topic in cryptography and it plays a very important role in many fields. A normal digital signature allows a signer to generate a signature of the message with his secret key and the generated signature can be verified by anyone with the signer’s public key. Chameleon signature is a non-interactive signature based on the well-established hash-and-sign paradigm, in which the receiver cannot convince the third party of the identity of the signer. Designated-verifier signature is a very useful tool for protecting the privacy of the valid verifier. Motivated by above statements, we construct a new chameleon hash scheme and construct a new DVICPS scheme. Our chameleon hash scheme satisfies all the properties of the normal chameleon hash function. In our hash function the owner of a public key does not need to retrieve the associated secret key. We prove that our new chameleon hash scheme satisfies all the attributes defined in [1] and our chameleon hash scheme is secure assuming Weak Computational Diffie- Hellman (WCDH) assumption is difficult. And we show our chameleon hash scheme is secure based on the difficulty of solving WCDHP assumption. Moreover, we use the proposed chameleon hash function to design a designated-verifier ID-based chameleon proxy signature (DVICPS) scheme. Furthermore, we analyze the security of our DVICPS scheme and prove that our DVICPS scheme is secure in the random oracle model. In our signature scheme, only the receiver who owns the corresponding secret key can verify the validity of the signature which efficiently protects the benefit of the verifier. We also prove that our signature scheme is secure in random oracle model. The success probability of forging our DVICPS scheme is equivalent to solving Computational Diffie- Hellman Problem (CDHP). Thus, our DVICPS scheme is secure and efficient. International Journal of Distributed Sensor Networks, 5: 29, 2009 Copyright Ó Taylor & Francis Group, LLC ISSN: 1550-1329 print / 1550-1477 online DOI: 10.1080/15501320802520639 This work is supported by the Natural Science Foundation of China(No: 60703044), the New Star Plan Project of Beijing Science and Technology (No: 2007B001), the PHR, Program for New Century Excellent Talents in University(NCET-06-188), The Beijing Natural Science Foundation Program and Scientific Research Key Program of Beijing Municipal Commission of Education(No: KZ2008 10009005), and 973 Program ( No: 2007CB310700). Address correspondence to Jianhong Zhang, North China University of Technology, Shijingshan District, Beijing, China. E-mail: [email protected] 29

Upload: others

Post on 25-Aug-2020

13 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Designated-Verifier Chameleon Proxy Signaturedownloads.hindawi.com/journals/ijdsn/2009/671329.pdf · Designated-Verifier Chameleon Proxy Signature JIANHONG ZHANG, CHENG JI, and QIN

Designated-Verifier Chameleon Proxy Signature

JIANHONG ZHANG, CHENG JI, and QIN GENG

North China University of Technology, Shijingshan District, Beijing, China

With the development of computer technology, the requirement of the methods to verify theauthenticity, the validity, and the integrity of information is becoming much bigger. For thispurpose, many methods have been generated, such as digital signature, digital watermarking,steganography, and so on. Digital signature is a hot topic in cryptography and it plays a veryimportant role in many fields. A normal digital signature allows a signer to generate a signature ofthe message with his secret key and the generated signature can be verified by anyone with thesigner’s public key. Chameleon signature is a non-interactive signature based on the well-establishedhash-and-sign paradigm, in which the receiver cannot convince the third party of the identity of thesigner. Designated-verifier signature is a very useful tool for protecting the privacy of the validverifier. Motivated by above statements, we construct a new chameleon hash scheme and construct anew DVICPS scheme. Our chameleon hash scheme satisfies all the properties of the normalchameleon hash function. In our hash function the owner of a public key does not need to retrievethe associated secret key. We prove that our new chameleon hash scheme satisfies all the attributesdefined in [1] and our chameleon hash scheme is secure assuming Weak Computational Diffie-Hellman (WCDH) assumption is difficult. And we show our chameleon hash scheme is secure basedon the difficulty of solving WCDHP assumption. Moreover, we use the proposed chameleon hashfunction to design a designated-verifier ID-based chameleon proxy signature (DVICPS) scheme.Furthermore, we analyze the security of our DVICPS scheme and prove that our DVICPS scheme issecure in the random oracle model. In our signature scheme, only the receiver who owns thecorresponding secret key can verify the validity of the signature which efficiently protects thebenefit of the verifier. We also prove that our signature scheme is secure in random oracle model.The success probability of forging our DVICPS scheme is equivalent to solving Computational Diffie-Hellman Problem (CDHP). Thus, our DVICPS scheme is secure and efficient.

International Journal of Distributed Sensor Networks, 5: 29, 2009

Copyright � Taylor & Francis Group, LLC

ISSN: 1550-1329 print / 1550-1477 online

DOI: 10.1080/15501320802520639

This work is supported by the Natural Science Foundation of China(No: 60703044), the NewStar Plan Project of Beijing Science and Technology (No: 2007B001), the PHR, Program for NewCentury Excellent Talents in University(NCET-06-188), The Beijing Natural Science FoundationProgram and Scientific Research Key Program of Beijing Municipal Commission of Education(No:KZ2008 10009005), and 973 Program ( No: 2007CB310700).

Address correspondence to Jianhong Zhang, North China University of Technology, ShijingshanDistrict, Beijing, China. E-mail: [email protected]

29

Page 2: Designated-Verifier Chameleon Proxy Signaturedownloads.hindawi.com/journals/ijdsn/2009/671329.pdf · Designated-Verifier Chameleon Proxy Signature JIANHONG ZHANG, CHENG JI, and QIN

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2010

RoboticsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Journal ofEngineeringVolume 2014

Submit your manuscripts athttp://www.hindawi.com

VLSI Design

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

DistributedSensor Networks

International Journal of