Cryptology ePrint Archive: Report 2016/779
Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction
Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Mohammad Reza Aref
Abstract: Strong designated verifier signatures make the message authenticated only to a designated person called the designated verifier while privacy of the signer's identity is preserved. This primitive is useful in scenarios that authenticity, signer ambiguity and signer's privacy are required simultaneously such as electronic voting and tendering. To have quantum-attack-resistant strong designated verifier signatures as recommended in National Institute of Standards and Technology internal report (NISTIR 8105, dated April 2016), a provably secure code-based construction was proposed by Koochak Shooshtari et al. in 2016.
In this paper, we show that this code-based candidate for strong designated verifier signatures does not have signer ambiguity or non-transferability, the main feature of strong designated verifier signatures. In addition, it is shown that it is not strongly unforgeable if a designated verifier transfers a signature to a third party.
Then, a new proposal for strong designated verifier signatures based on coding theory is presented, and its security which includes strong unforgeability, signer ambiguity and privacy of the signer's identity properties is proved under Goppa Parameterized Bounded Decoding and the Goppa Code Distinguishing assumptions in the random oracle model.
Category / Keywords: code-based signatures, strong designated verifier signatures, coding theory, provable security, random oracle model.
Date: received 12 Aug 2016
Contact author: mar61_rh at yahoo com
Available format(s): PDF | BibTeX Citation
Version: 20160817:070936 (All versions of this report)
Short URL: ia.cr/2016/779
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]