Meeting Tight Security for Multisignatures in the Plain Public Key Model

被引:6
|
作者
Yanai, Naoto [1 ]
机构
[1] Osaka Univ, Grad Sch Informat Sci & Technol, Suita, Osaka 5650871, Japan
基金
日本学术振兴会;
关键词
multisignatures; plain public key model; provable security; tight reduction; random oracle model; CDH problem; IDENTITY-BASED AGGREGATE; DIFFIE-HELLMAN PROBLEM; SIGNATURE SCHEMES; MESSAGE FLEXIBILITY; ORDER VERIFIABILITY; GENERAL-MODEL; POSSESSION; ATTACKS; MAPS; RSA;
D O I
10.1587/transfun.E101.A.1484
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multisignatures are digital signatures for a group consisting of multiple signers where each signer signs common documents via interaction with its co-signers and the data size of the resultant signatures for the group is independent of the number of signers. In this work, we propose a multisignature scheme, whose security can be tightly reduced to the CDH problem in bilinear groups, in the strongest security model where nothing more is required than that each signer has a public key, i.e., the plain public key model. Loosely speaking, our main idea for a tight reduction is to utilize a three-round interaction in a full-domain hash construction. Namely, we surmise that a full-domain hash construction with three-round interaction will become tightly secure under the CDH problem. In addition, we show that the existing scheme by Zhou et al. (ISC 2011) can be improved to a construction with a tight security reduction as an application of our proof framework.
引用
收藏
页码:1484 / 1493
页数:10
相关论文
共 50 条
  • [31] Public-key security systems
    Abdelguerfi, M
    Kaliski, BS
    Patterson, W
    [J]. IEEE MICRO, 1996, 16 (03) : 10 - 13
  • [32] On the security of the KMOV public key cryptosystem
    Bleichenbacher, D
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 235 - 248
  • [33] Provable security for public key schemes
    Pointcheval, D
    [J]. CONTEMPORARY CRYPTOLOGY, 2005, : 133 - 190
  • [34] Signed (Group) Diffie–Hellman Key Exchange with Tight Security
    Jiaxin Pan
    Chen Qian
    Magnus Ringerud
    [J]. Journal of Cryptology, 2022, 35
  • [35] A Framework for Automatic Security Proof of public-key cryptography in Computational Model
    Guang Yan
    Fei Jin-Long
    Gu Chun-Xiang
    Zhu Yue-Fei
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 882 - 886
  • [36] An Efficient and Practical Public Key Cryptosystem with CCA-Security on Standard Model
    Liu, Zhen
    Yang, Xiaoyuan
    Zhong, Weidong
    Han, Yiliang
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 486 - 495
  • [37] Improved Security Model for Public-Key Authenticated Encryption with Keyword Search
    Qin, Baodong
    Cui, Hui
    Zheng, Xiaokun
    Zheng, Dong
    [J]. PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 19 - 38
  • [38] An Efficient and Practical Public Key Cryptosystem with CCA-Security on Standard Model
    Zhen Liu
    Xiaoyuan Yang
    Weidong Zhong
    Yiliang Han
    [J]. Tsinghua Science and Technology, 2014, 19 (05) : 486 - 495
  • [39] Tight finite-key security for twin-field quantum key distribution
    Curras-Lorenzo, Guillermo
    Navarrete, Alvaro
    Azuma, Koji
    Kato, Go
    Curty, Marcos
    Razavi, Mohsen
    [J]. NPJ QUANTUM INFORMATION, 2021, 7 (01)
  • [40] Tight finite-key security for twin-field quantum key distribution
    Guillermo Currás-Lorenzo
    Álvaro Navarrete
    Koji Azuma
    Go Kato
    Marcos Curty
    Mohsen Razavi
    [J]. npj Quantum Information, 7