Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials

被引:0
|
作者
Derler, David [1 ]
Hanser, Christian [1 ]
Slamanig, Daniel [1 ]
机构
[1] Graz Univ Technol TUG, Inst Appl Informat Proc & Commun IAIK, A-8010 Graz, Austria
关键词
Proxy signatures; anonymous credentials; cryptographic protocols; privacy; provable security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy signatures enable an originator to delegate the signing rights for a restricted set of messages to a proxy. The proxy is then able to produce valid signatures only for messages from this delegated set on behalf of the originator. Recently, two variants of privacy-enhancing proxy signatures, namely blank signatures [25] and warrant-hiding proxy signatures [26], have been introduced. In this context, privacy-enhancing means that a verifier of a proxy signature does not learn anything about the delegated message set beyond the message being presented for verification. We observe that this principle bears similarities with functionality provided by anonymous credentials. Inspired by this observation, we examine black-box constructions of the two aforementioned proxy signatures from non-interactive anonymous credentials, i.e., anonymous credentials with a non-interactive showing protocol, and show that the so obtained proxy signatures are secure if the anonymous credential system is secure. Moreover, we present two concrete instantiations using well-known representatives of anonymous credentials, namely Camenisch-Lysyanskaya (CL) and Brands' credentials. While constructions of anonymous credentials from signature schemes with particular properties, such as CL signatures or structure-preserving signatures, as well as from special variants of signature schemes, such as group signatures, sanitizable and indexed aggregate signatures, are known, this is the first paper that provides constructions of special variants of signature schemes, i.e., privacy-enhancing proxy signatures, from anonymous credentials.
引用
收藏
页码:49 / 65
页数:17
相关论文
共 50 条
  • [21] Non-interactive verifiable privacy-preserving federated learning
    Xu, Yi
    Peng, Changgen
    Tan, Weijie
    Tian, Youliang
    Ma, Minyao
    Niu, Kun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 128 : 365 - 380
  • [22] Non-Interactive Anonymous Router with Quasi-Linear Router Computation
    Fernando, Rex
    Shi, Elaine
    Soni, Pratik
    Vanjani, Nikhil
    Waters, Brent
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2023, PT III, 2023, 14371 : 62 - 92
  • [23] An efficient non-interactive deniable authentication protocol with anonymous sender protection
    Hwang, Shin-Jia
    Chao, Chien-Hung
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (03): : 219 - 231
  • [24] Non-interactive Conditional Proxy Re-Signature in the Standard Model
    Lee, Eunsung
    Kim, Sang Woo
    [J]. COMPUTER JOURNAL, 2018, 61 (12): : 1772 - 1782
  • [25] Better than Advertised Security for Non-interactive Threshold Signatures
    Bellare, Mihir
    Crites, Elizabeth
    Komlo, Chelsea
    Maller, Mary
    Tessaro, Stefano
    Zhu, Chenzhi
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT IV, 2022, 13510 : 517 - 550
  • [26] Non-interactive conditional proxy re-signature in the standard model
    Lee E.
    Kim S.W.
    [J]. Lee, Eunsung (eslee10@postech.ac.kr), 1772, Oxford University Press (61): : 1772 - 1782
  • [27] Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy
    Sun, Shi-Feng
    Steinfeld, Ron
    Lai, Shangqi
    Yuan, Xingliang
    Sakzad, Amin
    Liu, Joseph K.
    Nepal, Surya
    Gu, Dawu
    [J]. 28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [28] Non-interactive privacy-preserving neural network prediction
    Ma, Xu
    Chen, Xiaofeng
    Zhang, Xiaoyu
    [J]. INFORMATION SCIENCES, 2019, 481 : 507 - 519
  • [29] Factors of Intention to Use a Photo Tool: Comparison Between Privacy-Enhancing and Non-privacy-enhancing Tools
    Bracamonte, Vanessa
    Pape, Sebastian
    Lobner, Sascha
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP SEC 2023, 2024, 679 : 321 - 334
  • [30] Dynamic Group Signatures with Message Dependent Opening and Non-Interactive Signing
    Anada, Hiroaki
    Fukumitsu, Masayuki
    Hasegawa, Shingo
    [J]. 2022 TENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING, CANDAR, 2022, : 76 - 82