Authors: Raghav Bhaskar, Javier Herranz, Fabien Laguillaumie
Addresses: Projet CODES – INRIA Rocquencourt, 78153 Le Chesnay cedex, France. ' Centrum voorWiskunde en Informatica (CWI), Kruislaan 413, P.O. Box 94079, GB Amsterdam NL-1090, The Netherlands. ' Projet TANC – INRIA Futurs, Ecole Polytechnique, Palaiseau cedex 91128, France
Abstract: A designated verifier signature convinces only the specific recipient of the message of its integrity and origin. Following the notion of aggregate signature introduced by Boneh et al. we introduce in this work the notion of aggregate designated verifier signature. After defining the protocols and the security model for such schemes, we give a general construction which is based on message authentication codes and that can be extended to an identity-based scenario. The resulting schemes are proved to be secure under the Computational Diffie–Hellman (CDH) assumption, in the random oracle model. They are much more efficient than standard aggregate signature schemes, at the price of losing some properties of standard signatures, in particular non-repudiation. Finally we explain the possible application of aggregate designated verifier signatures to the authentication of messages in routing protocols. We compare our new scheme with existing standard aggregate signature schemes and show why our solution with aggregate designated verifier signatures is more suitable for securing routing in mobile ad hoc networks.
Keywords: aggregate designated verifier signatures; message authentication code; MAC; ad hoc networks; routing protocols; security; cryptography; mobile networks.
International Journal of Security and Networks, 2007 Vol.2 No.3/4, pp.192 - 201
Available online: 11 Apr 2007 *Full-text access for editors Access for subscribers Purchase this article Comment on this article