On the invisibility of designated confirmer signatures



Publication Details

Xia, F., Wang, G. & Xue, R. (2011). On the invisibility of designated confirmer signatures. In B. Cheung, L. Hui, R. Sandhu & D. Wong (Eds.), Proceeding of the 6th International Symposium on ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011) (pp. 268-276). New York, NY: ACM.


As an important cryptographic primitive, designated con- rmer signatures are introduced to control the public veria- bility of signatures. That is, only the signer or a semi-trusted party, called designated conrmer, can interactively assist a verier to check the validity of a designated conrmer sig- nature. The central security property of a designated con- rmer signature scheme is called invisibility, which requires that even an adaptive adversary cannot determine the valid- ity of an alleged signature without direct cooperation from either the signer or the designated conrmer. However, in the literature researchers have proposed two other related properties, called impersonation and transcript simulatabil- ity, though the relations between them are not clear. In this paper, we rst explore the relations among these three invisi- bility related concepts and conclude that invisibility, imper- sonation and transcript simulatability forms an increasing stronger order. After that, we turn to study the invisibil- ity of two designated conrmer signature schemes recently presented by Zhang et al. and Wei et al. By demonstrating concrete and eective attacks, we show that both of those two scheme fail to meet invisibility, the central security prop- erty of designated conrmer signatures.

Please refer to publisher version or contact your library.



Link to publisher version (DOI)