The Semi-Generic Group Model and Applications to Pairing-Based Cryptography

被引:0
|
作者
Jager, Tibor [1 ]
Rupp, Andy [2 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[2] Univ Trier, Trier, Germany
来源
关键词
Restricted models of computation; generic groups; semi-generic group model; cryptographic assumptions; master theorems; provable security; pairingbased cryptography; IDENTITY-BASED ENCRYPTION; ONE ROUND PROTOCOL; COMPUTATION; LOGARITHMS; SIGNATURES; RSA;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In pairing-based cryptography the Generic Group Model (GGM) is used frequently to provide evidence towards newly introduced hardness assumptions. Unfortunately, the GGM does not reflect many known properties of bilinear group settings and thus hardness results in this model are of limited significance. This paper proposes a novel computational model for pairing-based cryptography, called the Semi-Generic Group Model (SGGM), that is closer to the standard model and allows to make more meaningful security guarantees. In fact, the hest algorithms currently known for solving pairing-based problems are semi-generic in nature. We demonstrate the usefulness of our new model by applying it to study several important assumptions (BDDH, Co-DH). Furthermore, we develop master theorems facilitating an easy analysis of other (future) assumptions. These master theorems imply that (unless there are better algorithms than the semi-generic ones) great parts of the zoo of novel assumptions over bilinear groups are reducible to just two (more or less) standard assumptions over finite fields. Finally, we examine the appropriateness of the SGGM as a tool for analyzing the security of practical cryptosystems without random oracles by applying it to the BLS signature scheme.
引用
收藏
页码:539 / +
页数:3
相关论文
共 50 条
  • [41] AMY: A SIMPLE AND SECURE WAY TO CONNECT DEVICES USING PAIRING-BASED CRYPTOGRAPHY
    Shin, Wook
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE 2011), 2011, : 359 - 360
  • [42] Towards the use of Pairing-Based Cryptography for Resource-Constrained Home Area Networks
    Jacobsen, Rune Hylsberg
    Mikkelsen, Soren Aagaard
    Rasmussen, Niels Holm
    2015 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2015, : 233 - 240
  • [43] PairVoting: A Secure Online Voting Scheme Using Pairing-Based Cryptography and Fuzzy Extractor
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    Sarma, Nityananda
    2015 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNCATIONS SYSTEMS (ANTS), 2015,
  • [44] Adding controllable linkability to pairing-based group signatures for free
    Slamanig, Daniel
    Spreitzer, Raphael
    Unterluggauer, Thomas
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8783 : 388 - 400
  • [45] Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures
    El Aimani, Laila
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 145 - 157
  • [46] Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller
    Lopes Gouvea, Conrado Porto
    Lopez, Julio
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 248 - 262
  • [47] A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Usinga Fog Computing Facility With Pairing-Based Cryptography
    Al Hamid, Hadeal Abdulaziz
    Rahman, Sk Md Mizanur
    Hossain, M. Shamim
    Almogren, Ahmad
    Alamri, Atif
    IEEE ACCESS, 2017, 5 : 22313 - 22328
  • [48] Fast Computation of Multi-Scalar Multiplication for Pairing-Based zkSNARK Applications
    Luo, Guiwen
    Gong, Guang
    2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC, 2023,
  • [49] Semi-generic construction of public key encryption and identity-based encryption with equality test
    Lee, Hyung Tae
    Ling, San
    Seo, Jae Hong
    Wang, Huaxiong
    INFORMATION SCIENCES, 2016, 373 : 419 - 440
  • [50] Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation
    Emura, Keita
    Seo, Jae Hong
    Youn, Taek-Young
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (01) : 83 - 91