Threshold BBS plus Signatures for Distributed Anonymous Credential Issuance

被引:6
|
作者
Doerner, Jack [1 ]
Kondi, Yashvanth [2 ]
Lee, Eysa [3 ]
Shelat, Abhi [3 ]
Tyner, LaKyah [3 ]
机构
[1] Technion, Haifa, Israel
[2] Aarhus Univ, Aarhus, Denmark
[3] Northeastern Univ, Boston, MA 02115 USA
关键词
PROOFS; IDENTIFICATION; ASSUMPTION;
D O I
10.1109/SP46215.2023.10179470
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a secure multiparty signing protocol for the BBS+ signature scheme; in other words, an anonymous credential scheme with threshold issuance. We prove that due to the structure of the BBS+ signature, simply verifying the signature produced by an otherwise semi-honest protocol is sufficient to achieve composable security against a malicious adversary. Consequently, our protocol is extremely simple and efficient: it involves a single request from the client (who requires a signature) to the signing parties, two exchanges of messages among the signing parties, and finally a response to the client; in some deployment scenarios the concrete cost bottleneck may be the client's local verification of the signature that it receives. Furthermore, our protocol can be extended to support the strongest form of blind signing and to serve as a distributed evaluation protocol for the DodisYampolskiy Oblivious VRF. We validate our efficiency claims by implementing and benchmarking our protocol.
引用
收藏
页码:773 / 789
页数:17
相关论文
共 13 条
  • [1] Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
    Shahandashti, Siamak F.
    Safavi-Naini, Reihaneh
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 198 - +
  • [2] Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems
    Fathi, Hanane
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2010, 54 (01) : 225 - 236
  • [3] Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems
    Hanane Fathi
    SeongHan Shin
    Kazukuni Kobara
    Hideki Imai
    [J]. Wireless Personal Communications, 2010, 54 : 225 - 236
  • [4] Improving efficiency and security of Camenisch-Lysyanskaya signatures for anonymous credential systems
    Loh, Jia-Chng
    Guo, Fuchun
    Susilo, Willy
    [J]. COMPUTER STANDARDS & INTERFACES, 2025, 91
  • [5] Integrating Threshold Opening With Threshold Issuance of Anonymous Credentials Over Blockchains for a Multi-Certifier Communication Model
    Naaz, Adeeba
    Kumar, T. V. Pavan
    Francis, Maria
    Kataoka, Kotaro
    [J]. IEEE ACCESS, 2022, 10 : 128697 - 128720
  • [6] Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers
    Sonnino, Alberto
    Al-Bassam, Mustafa
    Bano, Shehar
    Meiklejohn, Sarah
    Danezis, George
    [J]. 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
  • [7] Fully distributed identity-based threshold signatures with identifiable aborts
    Yan JIANG
    Youwen ZHU
    Jian WANG
    Xingxin LI
    [J]. Frontiers of Computer Science., 2023, 17 (05) - 192
  • [8] Fully distributed identity-based threshold signatures with identifiable aborts
    Jiang, Yan
    Zhu, Youwen
    Wang, Jian
    Li, Xingxin
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2023, 17 (05)
  • [9] Fully distributed identity-based threshold signatures with identifiable aborts
    Yan Jiang
    Youwen Zhu
    Jian Wang
    Xingxin Li
    [J]. Frontiers of Computer Science, 2023, 17
  • [10] Provably secure distributed Schnorr signatures and a (t, n) threshold scheme for implicit certificates
    Stinson, DR
    Strobl, R
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 417 - 434