Weakly Secure Equivalence-Class Signatures from Standard Assumptions

被引:6
|
作者
Fuchsbauer, Georg [1 ,2 ]
Gay, Romain [1 ,2 ]
机构
[1] INRIA, Paris, France
[2] PSL Res Univ, CNRS, Ecole Normale Super, Paris, France
来源
基金
欧洲研究理事会;
关键词
Structure-preserving signatures on equivalence classes; Standard assumptions; STRUCTURE-PRESERVING SIGNATURES; OPTIMAL BLIND SIGNATURES; KNOWLEDGE; PROOFS;
D O I
10.1007/978-3-319-76581-5_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Structure-preserving signatures on equivalence classes, or equivalence-class signatures for short (EQS), are signature schemes defined over bilinear groups whose messages are vectors of group elements. Signatures are perfectly randomizable and given a signature on a vector, anyone can derive a signature on any multiple of the vector; EQS thus sign projective equivalence classes. Applications of EQS include the first constant-size anonymous attribute-based credentials, efficient round-optimal blind signatures without random oracles and efficient access-control encryption. To date, the only existing instantiation of EQS is proven secure in the generic-group model. In this work we show that by relaxing the definition of unforgeability, which makes it efficiently verifiable, we can construct EQS from standard assumptions, namely the Matrix-Diffie-Hellman assumptions. We then show that our unforgeability notion is sufficient for most applications.
引用
收藏
页码:153 / 183
页数:31
相关论文
共 50 条
  • [41] Verifiable Random Functions from Standard Assumptions
    Hofheinz, Dennis
    Jager, Tibor
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 : 336 - 362
  • [42] Limits of Provable Security From Standard Assumptions
    Pass, Rafael
    [J]. STOC 11: PROCEEDINGS OF THE 43RD ACM SYMPOSIUM ON THEORY OF COMPUTING, 2011, : 109 - 118
  • [43] Secure Outsourced Attribute-Based Signatures with Perfect Anonymity in the Standard Model
    Huang, Zhenjie
    Duan, Runlong
    Chen, Qunshan
    Huang, Hui
    Zhou, Yuping
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [44] Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model
    Xie, Dong
    Peng, HaiPeng
    Li, Lixiang
    Yang, Yixian
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (05): : 2427 - 2445
  • [45] Pairing-Free Blind Signatures from CDH Assumptions
    Chairattana-Apirom, Rutchathon
    Tessaro, Stefano
    Zhu, Chenzhi
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT I, 2024, 14920 : 174 - 209
  • [46] Round Optimal Secure Multiparty Computation from Minimal Assumptions
    Choudhuri, Arka Rai
    Ciampi, Michele
    Goyal, Vipul
    Jain, Abhishek
    Ostrovsky, Rafail
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2020, PT II, 2020, 12551 : 291 - 319
  • [47] Generic Transformation from Weakly to Strongly Unforgeable Signatures
    Qiong Huang
    Duncan S. Wong
    Jin Li
    Yi-Ming Zhao
    [J]. Journal of Computer Science and Technology, 2008, 23 : 240 - 252
  • [48] Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
    Damgard, Ivan
    Scafuro, Alessandra
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 100 - 119
  • [49] Generic Transformation from Weakly to Strongly Unforgeable Signatures
    黄琼
    王石
    李进
    赵一鸣
    [J]. Journal of Computer Science & Technology, 2008, (02) : 240 - 252
  • [50] Generic transformation from weakly to strongly unforgeable signatures
    Huang, Qiong
    Wong, Duncan S.
    Li, Jin
    Zhao, Yi-Ming
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2008, 23 (02) : 240 - 252