Practical "Signatures with Efficient Protocols" from Simple Assumptions

被引:21
|
作者
Libert, Benoit [1 ]
Mouhartem, Fabrice [1 ]
Peters, Thomas [2 ]
Yung, Moti [3 ,4 ]
机构
[1] Ecole Normale Super Lyon, Lyon, France
[2] Catholic Univ Louvain, Louvain, Belgium
[3] Snapchat, Venice, CA USA
[4] Columbia Univ, New York, NY 10027 USA
关键词
Signature; Signature with Efficient Protocols; Privacy; Anonymous Credentials; Group Signatures; Efficient Privacy-Enhancing Protocols; Simple Cryptographic Assumptions; SECURITY;
D O I
10.1145/2897845.2897898
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital signatures are perhaps the most important base for authentication and trust relationships in large scale systems. More specifically, various applications of signatures provide privacy and anonymity preserving mechanisms and protocols, and these, in turn, are becoming critical (due to the recently recognized need to protect individuals according to national rules and regulations). A specific type of signatures called "signatures with efficient protocols", as introduced by Camenisch and Lysyanskaya (CL), efficiently accommodates various basic protocols and extensions like zero-knowledge proofs, signing committed messages, or re-randomizability. These are, in fact, typical operations associated with signatures used in typical anonymity and privacy-preserving scenarios. To date there are no "signatures with efficient protocols" which are based on simple assumptions and truly practical. These two properties assure us a robust primitive: First, simple assumptions are needed for ensuring that this basic primitive is mathematically robust and does not require special ad hoc assumptions that are more risky, imply less efficiency, are more tuned to the protocol itself, and are perhaps less trusted. In the other dimension, efficiency is a must given the anonymity applications of the protocol, since without proper level of efficiency the future adoption of the primitives is always questionable (in spite of their need). In this work, we present a new CL-type signature scheme that is re-randomizable under a simple, well-studied, and by now standard, assumption (SXDH). The signature is efficient (built on the recent QA-NIZK constructions), and is, by design, suitable to work in extended contexts that typify privacy settings (like anonymous credentials, group signature, and offline e-cash). We demonstrate its power by presenting practical protocols based on it.
引用
收藏
页码:511 / 522
页数:12
相关论文
共 50 条
  • [1] Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
    Libert, Benoit
    Ling, San
    Mouhartem, Fabrice
    Nguyen, Khoa
    Wang, Huaxiong
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 373 - 403
  • [2] Practical Signatures from Standard Assumptions
    Boehl, Florian
    Hofheinz, Dennis
    Jager, Tibor
    Koch, Jessica
    Seo, Jae Hong
    Striecks, Christoph
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 461 - 485
  • [3] Practical Adaptive Oblivious Transfer from Simple Assumptions
    Green, Matthew
    Hohenberger, Susan
    [J]. THEORY OF CRYPTOGRAPHY, 2011, 6597 : 347 - 363
  • [4] Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions
    del Pino, Rafael
    Katsumata, Shuichi
    Maller, Mary
    Mouhartem, Fabrice
    Prest, Thomas
    Saarinen, Markku-Juhani
    [J]. ADVANCES IN CRYPTOLOGY, PT II, EUROCRYPT 2024, 2024, 14652 : 219 - 248
  • [5] Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions
    Katsumata, Shuichi
    Reichle, Michael
    Sakai, Yusuke
    [J]. ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT II, 2023, 14439 : 383 - 417
  • [6] Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions
    Fuchsbauer, Georg
    Hanser, Christian
    Kamath, Chethan
    Slamanig, Daniel
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 391 - 408
  • [7] Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
    Libert, Benoit
    Peters, Thomas
    Yung, Moti
    [J]. ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 296 - 316
  • [8] Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM
    Don, Jelle
    Fehr, Serge
    Majenz, Christian
    Schaffner, Christian
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 729 - 757
  • [9] Short Signatures from Weaker Assumptions
    Hofheinz, Dennis
    Jager, Tibor
    Kiltz, Eike
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 647 - +
  • [10] Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
    Chow, Sherman S. M.
    Dodis, Yevgeniy
    Rouselakis, Yannis
    Waters, Brent
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 152 - 161