A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme
Abstract
:1. Introduction
1.1. Related Work
1.2. Paper Organization
2. Preliminaries
2.1. Cryptographic Primitives
- (i)
- Computability or One-way: For any given message, it is easy to compute the hash value but practically impossible to invert.
- (ii)
- Preimage resistance: It is computationally infeasible to find a message M that is hashed to y for any hash value y.
- (iii)
- Second-preimage resistance: For a given message M, it is computationally infeasible to find another message , which hashes to the same value as the message M, i.e., .
- (iv)
- Collision resistance: It is computationally infeasible to find another message that hashes to the same value as the message M, i.e., for a given message M.
2.2. Designated Verifier Signature Schemes
2.3. Designated Verifier Signature Schemes’ Security Model
- (a)
- C produces and key pairs for the signer S and the verifier V, respectively, and gives to the adversary A.
- (b)
- : For the appropriate inputs, A can query the hash oracle .
- (c)
- : A can ask the signing oracle for a signature on a message M for the signer S and the chosen verifier V. The oracle responds by returning a signature on M, where is valid with regard to and .
- (d)
- Finally, A outputs a forgery on a message without querying . A wins the game if the signature is valid for in terms of and and it did not query on input .
3. Proposed Hash-Based Quantum-Resistant Designated Verifier Signature Scheme
Construction of a Quantum-Resistant Hash-Based Designated Verifier Signature Scheme (HBDVS)
Algorithm 1 Key Generation |
Input:H and a matrix X of size l where for Output: Initialize of size l values as 0 Initialize as X For do EndFor return |
Algorithm 2 Signing |
Input:, , , , , h, H and M Output: return |
Algorithm 3 Verify |
Input: signature , , , M, h and H Output: Boolean ( or ) , . If do: return “True” Endif Else do return “False” EndElse |
Algorithm 4 Sim |
Input:, , , , , h, H and M Output: . return |
4. Security Analysis
5. Results and Discussion
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Chaum, D.; Antwerpen, H.V. Undeniable signatures. In Proceedings of the Conference on the Theory and Application of Cryptology, LNCS; Springer: New York, NY, USA, 1989; Volume 435, pp. 212–216. [Google Scholar]
- Jakobsson, M.; Sako, K.; Impagliazzo, R. Designated verifier proofs and their applications. In Advances in Cryptology EUROCRYPT96; Springer: Berlin/Heidelberg, Germany, 1996; pp. 143–154. [Google Scholar]
- Saeednia, S.; Kremer, S.; Markowitch, O. An efficient strong designated verifier signature scheme. In Proceedings of the International Conference on Information Security and Cryptology, Seoul, Korea, 27–28 November 2003; pp. 40–54. [Google Scholar]
- Huang, X.; Susilo, W.; Mu, Y.; Zhang, F. Short (identity-based) strong designated verifier signature schemes. In Proceedings of the International Conference on Information Security Practice and Experience, Hangzhou, China, 11–14 April 2006; pp. 214–225. [Google Scholar]
- Kang, B.; Boyd, C.; Dawson, E. A novel identity-based strong designated verifier signature scheme. J. Syst. Softw. 2009, 82, 270–273. [Google Scholar] [CrossRef]
- Laguillaumie, F.; Vergnaud, D. Designated verifier signatures: Anonymity and efficient construction from any bilinear map. In Proceedings of the International Conference on Security in Communication Networks, Amalfi, Italy, 8–10 September 2004; pp. 105–119. [Google Scholar]
- Li, Y.; Lipmaa, H.; Pei, D. On delegatability of four designated verifiersignatures. In Proceedings of the International Conference on Information and Communications Security, Beijing, China, 10–13 December 2005; pp. 61–71. [Google Scholar]
- Zhang, J.; Mao, J. A novel id-based designated verifier signature scheme. Inf. Sci. 2008, 178, 766–773. [Google Scholar] [CrossRef]
- De Almeida, M.P.; De Sousa Júnior, R.T.; García Villalba, L.J.; Kim, T.H. New DoS defense method based on strong designated verifier signatures. Sensors 2008, 18, 2813. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Chen, Y.; Zhao, Y.; Xiong, H.; Yue, F. A certificateless strong designated verifier signature scheme with non-delegatability. IJ Netw. Secur. 2017, 19, 573–582. [Google Scholar]
- Lin, H.Y. A new Certificateless strong designated verifier signature scheme: Non delegetable and SSA-KCA Secure. IEEE Access 2018, 6, 50765–50775. [Google Scholar] [CrossRef]
- Han, S.; Xie, M.; Yang, B.; Lu, R.; Bao, H.; Lin, J.; Han, S. A certificateless verifiable strong designated verifier signature scheme. IEEE Access 2019, 7, 126391–126408. [Google Scholar] [CrossRef]
- Shor, P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. Comput. 1997, 26, 1484–1509. [Google Scholar] [CrossRef] [Green Version]
- Chang, W.L.; Vasilakos, A.V. Fundamentals of Quantum Programming in IBM’s Quantum Computers; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
- Chang, W.L.; Chen, J.C.; Chung, W.Y.; Hsiao, C.Y.; Wong, R.; Vasilakos, A.V. Quantum Speedup and Mathematical Solutions from Implementing Bio-molecular Solutions for the Independent Set Problem on IBM’s Quantum Computers. IEEE Trans. NanoBiosci. 2021, 20, 354–376. [Google Scholar] [CrossRef]
- Thanalakshmi, P.; Anitha, R. A new code-based designated verifier signature scheme. Int. J. Commun. Syst. 2018, 31, e3803. [Google Scholar] [CrossRef]
- Asaar, M.R.; Salmasizadeh, M.; Aref, M.R. Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction. IACR Cryptol. ePrint Arch. 2016, 779, 1–15. [Google Scholar]
- Ren, Y.; Wang, H.; Du, J.; Ma, L. Code-based authentication with designated verifier. Int. J. Grid Util. Comput. 2016, 7, 61–67. [Google Scholar] [CrossRef]
- Shooshtari, M.K.; Ahmadian-Attari, M.; Aref, M.R. Provably secure strong designated verifier signature scheme based on coding theory. Int. J. Commun. Syst. 2016, 30, e3162. [Google Scholar] [CrossRef]
- Daniel, A.; Lejla, B.; Bernstein, D.J.; Bos, J.; Buchmann, J.; Castryck, W.; Dunkelman, O.; Guneysu, T.; Gueron, S.; Hulsing, A.; et al. Initial Recommendations of Long-Term Secure Post-Quantum Systems. PQCRYPTO. EU. Horizon 2020. 2015. Available online: https://pqcrypto.eu.org/docs/initial-recommendations.pdf (accessed on 1 February 2020).
- Process, S.P. Third Round Candidate Announcement; NIST Computer Security Resource Center (CSRC): Gaithersburg, MD, USA, 2020. [Google Scholar]
- Wang, F.; Hu, Y.; Wang, B. Lattice-based strong designate verifier signature and its applications. Malays. J. Comput. Sci. 2012, 25, 11–22. [Google Scholar]
- Noh, G.; Jeong, I.R. Strong designated verifier signature scheme from lattices in the standard model. Secur. Commun. Netw. 2016, 9, 6202–6214. [Google Scholar] [CrossRef]
- Cai, J.; Jiang, H.; Zhang, P.; Zheng, Z.; Lyu, G.; Xu, Q. An Efficient Strong Designated Verifier Signature Based on R—SIS Assumption. IEEE Access 2019, 7, 3938–3947. [Google Scholar] [CrossRef]
- Suhail, S.; Hussain, R.; Khan, A.; Hong, C.S. On the role of hash-based signatures in quantum-safe internet of things: Current solutions and future directions. IEEE Internet Things J. 2020, 8, 1–17. [Google Scholar] [CrossRef]
- Chen, L.; Han, L.; Jing, J.; Hu, D. A post quantum provable data possession protocol in cloud. Secur. Commun. Netw. 2013, 6, 658–667. [Google Scholar] [CrossRef]
- Thanalakshmi, P.; Anitha, R.; Anbazhagan, N.; Cho, W.; Joshi, G.P.; Yang, E. A Hash-Based Quantum-Resistant Chameleon Signature Scheme. Sensors 2021, 21, 8417. [Google Scholar] [CrossRef]
- Lamport, L. Constructing Digital Signatures from a One-Way Function; Technical Report CSL-98; SRI International: Menlo Park, CA, USA, 1979; Volume 238. [Google Scholar]
- Merkle, R.C. A digital signature based on a conventional encryption function. In Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, 25–27 May 1988; pp. 369–378. [Google Scholar]
- Bleichenbacher, D.; Maurer, U.M. Directed acyclic graphs, one-way functions and digital signatures. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 21–25 August 1994; pp. 75–82. [Google Scholar]
- Hevia, A.; Micciancio, D. The provable security of graph-based one-time signatures and extensions to algebraic signature schemes. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, 1–5 December 2002; pp. 379–396. [Google Scholar]
- Shahid, F.; Ahmad, I.; Imran, M.; Shoaib, M. Novel one time Signatures (NOTS): A compact post-quantum digital signature scheme. IEEE Access 2020, 8, 15895–15906. [Google Scholar] [CrossRef]
- Micciancio, D.; Regev, O. Lattice-based cryptography. In Post-Quantum Cryptography; Springer: Berlin/Heidelberg, Germany, 2009; pp. 147–191. [Google Scholar]
- Feng, D.; Xu, J.; Chen, W. Generic Constructions for Strong Designated Verifier Signature. J. Inf. Process. Syst. 2011, 7, 159–172. [Google Scholar] [CrossRef] [Green Version]
- Pointcheval, D.; Stern, J. Security arguments for digital signatures and blind signatures. J. Cryptol. 2000, 13, 361–396. [Google Scholar] [CrossRef]
Scheme | System | Hard Problem | Signature Size in Bits |
---|---|---|---|
Wang et al. (2012) [22] | Lattice-based | LWE-SIS | |
Noh and Jeong (2016) [23] | Lattice-based | LWE-SIS | |
Cai et al. (2019) [24] | Lattice-based | R-SIS | |
Proposed HBDVS | Hash-based | PR |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Thanalakshmi, P.; Anitha, R.; Anbazhagan, N.; Park, C.; Joshi, G.P.; Seo, C. A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme. Mathematics 2022, 10, 1642. https://doi.org/10.3390/math10101642
Thanalakshmi P, Anitha R, Anbazhagan N, Park C, Joshi GP, Seo C. A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme. Mathematics. 2022; 10(10):1642. https://doi.org/10.3390/math10101642
Chicago/Turabian StyleThanalakshmi, P., R. Anitha, N. Anbazhagan, Chulho Park, Gyanendra Prasad Joshi, and Changho Seo. 2022. "A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme" Mathematics 10, no. 10: 1642. https://doi.org/10.3390/math10101642