Synchronized Aggregate Signatures from the RSA Assumption

被引:26
|
作者
Hohenberger, Susan [1 ]
Waters, Brent [2 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
[2] Univ Texas Austin, Austin, TX 78712 USA
基金
美国国家科学基金会;
关键词
IDENTITY-BASED AGGREGATE; VERIFIABLY ENCRYPTED SIGNATURES; MULTILINEAR MAPS; MULTISIGNATURES; HASH;
D O I
10.1007/978-3-319-78375-8_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work we construct efficient aggregate signatures from the RSA assumption in the synchronized setting. In this setting, the signing algorithm takes as input a (time) period t as well the secret key and message. A signer should sign at most once for each t. A set of signatures can be aggregated so long as they were all created for the same period t. Synchronized aggregate signatures are useful in systems where there is a natural reporting period such as log and sensor data, or for signatures embedded in a blockchain protocol. We design a synchronized aggregate signature scheme that works for a bounded number of periods T that is given as a parameter to a global system setup. The big technical question is whether we can create solutions that will perform well with the large T values that we might use in practice. For instance, if one wanted signing keys to last up to ten years and be able to issue signatures every second, then we would need to support a period bound of upwards of 2(28). We build our solution in stages where we start with an initial solution that establishes feasibility, but has an impractically large signing time where the number of exponentiations and prime searches grows linearly with T. We prove this scheme secure in the standard model under the RSA assumption with respect to honestly-generated keys. We then provide a tradeoff method where one can tradeoff the time to create signatures with the space required to store private keys. One point in the tradeoff is where each scales with root T. Finally, we reach our main innovation which is a scheme where both the signing time and storage scale with lg T which allows for us to keep both computation and storage costs modest even for large values of T. Conveniently, our final scheme uses the same verification algorithm, and has the same distribution of public keys and signatures as the first scheme. Thus we are able to recycle the existing security proof for the new scheme. We also extend our results to the identity-based setting in the random oracle model, which can further reduce the overall cryptographic overhead. We conclude with a detailed evaluation of the signing time and storage requirements for various settings of the system parameters.
引用
收藏
页码:197 / 229
页数:33
相关论文
共 50 条
  • [1] An Efficient Synchronized Aggregate Signature Scheme From Standard RSA Assumption
    Quo, Xinshun
    Wang, Zhiwei
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2014, 7 (03): : 229 - 240
  • [2] Short and Stateless Signatures from the RSA Assumption
    Hohenberger, Susan
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 654 - +
  • [3] On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption
    Fukumitsu, Masayuki
    Hasegawa, Shingo
    Isobe, Shuji
    Shizuya, Hiroki
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 290 - 305
  • [4] Constructing committed signatures from strong-RSA assumption in the standard complexity model
    Zhu, HF
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 101 - 114
  • [5] Synchronized Aggregate Signatures: New Definitions, Constructions and Applications
    Ahn, Jae Hyun
    Green, Matthew
    Hohenberger, Susan
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 473 - 484
  • [6] Synchronized Aggregate Signature Under Standard Assumption in the Random Oracle Model
    Kabaleeshwaran, R.
    Sai, Panuganti Venkata Shanmukh
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2023, PT I, 2024, 14459 : 197 - 220
  • [7] WHICH NEW RSA SIGNATURES CAN BE COMPUTED FROM SOME GIVEN RSA SIGNATURES
    EVERTSE, JH
    VANHEYST, E
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 83 - 97
  • [8] Practical group signatures from RSA
    Cui, Shi
    Cheng, Xiangguo
    Chan, Choong Wah
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 121 - +
  • [9] Space Efficient Signature Schemes from the RSA Assumption
    Yamada, Shota
    Hanaoka, Goichiro
    Kunihiro, Noboru
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 102 - 119
  • [10] Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
    Coron, Jean-Sebastien
    Joux, Antoine
    Mandal, Avradip
    Naccache, David
    Tibouchi, Mehdi
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 147 - +