Weakly Secure Equivalence-Class Signatures from Standard Assumptions

被引:6
|
作者
Fuchsbauer, Georg [1 ,2 ]
Gay, Romain [1 ,2 ]
机构
[1] INRIA, Paris, France
[2] PSL Res Univ, CNRS, Ecole Normale Super, Paris, France
来源
基金
欧洲研究理事会;
关键词
Structure-preserving signatures on equivalence classes; Standard assumptions; STRUCTURE-PRESERVING SIGNATURES; OPTIMAL BLIND SIGNATURES; KNOWLEDGE; PROOFS;
D O I
10.1007/978-3-319-76581-5_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Structure-preserving signatures on equivalence classes, or equivalence-class signatures for short (EQS), are signature schemes defined over bilinear groups whose messages are vectors of group elements. Signatures are perfectly randomizable and given a signature on a vector, anyone can derive a signature on any multiple of the vector; EQS thus sign projective equivalence classes. Applications of EQS include the first constant-size anonymous attribute-based credentials, efficient round-optimal blind signatures without random oracles and efficient access-control encryption. To date, the only existing instantiation of EQS is proven secure in the generic-group model. In this work we show that by relaxing the definition of unforgeability, which makes it efficiently verifiable, we can construct EQS from standard assumptions, namely the Matrix-Diffie-Hellman assumptions. We then show that our unforgeability notion is sufficient for most applications.
引用
收藏
页码:153 / 183
页数:31
相关论文
共 50 条
  • [31] Adaptively secure broadcast encryption under standard assumptions with better efficiency
    Lee, Kwangsu
    Lee, Dong Hoon
    [J]. IET INFORMATION SECURITY, 2015, 9 (03) : 149 - 157
  • [32] Practical (fully) distributed signatures provably secure in the standard model
    Wang, Yujue
    Wong, Duncan S.
    Wu, Qianhong
    Chow, Sherman S. M.
    Qin, Bo
    Liu, Jianwei
    Ding, Yong
    [J]. THEORETICAL COMPUTER SCIENCE, 2015, 595 : 143 - 158
  • [33] Efficient identity-based signatures secure in the standard model
    Paterson, Kenneth G.
    Schuldt, Jacob C. N.
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 207 - 222
  • [34] Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
    Hara, Keisuke
    Kitagawa, Fuyuki
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Tanaka, Keisuke
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 795 : 570 - 597
  • [35] Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
    Hara, Keisuke
    Kitagawa, Fuyuki
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Tanaka, Keisuke
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 140 - 159
  • [36] Sublinear Secure Computation from New Assumptions
    Boyle, Elette
    Couteau, Geoffroy
    Meyer, Pierre
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 121 - 150
  • [37] Kleptography from Standard Assumptions and Applications
    Young, Adam
    Yung, Moti
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 271 - 290
  • [38] A Short Paper on Blind Signatures from Knowledge Assumptions
    Hanzlik, Lucjan
    Kluczniak, Kamil
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 535 - 543
  • [39] Practical "Signatures with Efficient Protocols" from Simple Assumptions
    Libert, Benoit
    Mouhartem, Fabrice
    Peters, Thomas
    Yung, Moti
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 511 - 522
  • [40] Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions
    Mitrokotsa, Aikaterini
    Mukherjee, Sayantan
    Sedaghat, Mandi
    Slamanig, Daniel
    Tomy, Jenit
    [J]. PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 163 - 195