Short and Stateless Signatures from the RSA Assumption

被引:0
|
作者
Hohenberger, Susan [1 ]
Waters, Brent [2 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
[2] Univ Texas Austin, Austin, TX 78712 USA
来源
关键词
SIGN SIGNATURES; HASH; SCHEMES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present the first signature scheme which is "short"; stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA setting required either a strong complexity assumption such as Strong RSA or (recently) that the signer maintain state. A signature in our scheme is comprised of one element in Z(N)* and one integer. The public key is also short, requiring only the modulus N, one element of S-N*, one integer and one PRF seed. To design our signature; we employ the known generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash. We then introduce a new proof technique for reasoning about weakly-secure signatures. This technique enables the simulator to predict a prefix of the message on which the adversary will forge and to use knowledge of this prefix to embed the challenge. This technique has wider applications beyond RSA. We use it to provide an entirely new analysis of the security of the Waters signatures: the only short; stateless signatures known to be secure under the Computational Diffie-Hellman assumption in the standard model.
引用
收藏
页码:654 / +
页数:3
相关论文
共 50 条
  • [1] Synchronized Aggregate Signatures from the RSA Assumption
    Hohenberger, Susan
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 197 - 229
  • [2] On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption
    Fukumitsu, Masayuki
    Hasegawa, Shingo
    Isobe, Shuji
    Shizuya, Hiroki
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 290 - 305
  • [3] Constructing committed signatures from strong-RSA assumption in the standard complexity model
    Zhu, HF
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 101 - 114
  • [4] WHICH NEW RSA SIGNATURES CAN BE COMPUTED FROM SOME GIVEN RSA SIGNATURES
    EVERTSE, JH
    VANHEYST, E
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 83 - 97
  • [5] Practical group signatures from RSA
    Cui, Shi
    Cheng, Xiangguo
    Chan, Choong Wah
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 121 - +
  • [6] Space Efficient Signature Schemes from the RSA Assumption
    Yamada, Shota
    Hanaoka, Goichiro
    Kunihiro, Noboru
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 102 - 119
  • [7] Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
    Coron, Jean-Sebastien
    Joux, Antoine
    Mandal, Avradip
    Naccache, David
    Tibouchi, Mehdi
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 147 - +
  • [8] Short Unique Signatures from RSA with a Tight Security Reduction (in the Random Oracle Model)
    Shacham, Hovav
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 61 - 79
  • [9] RSA-OAEP Is Secure under the RSA Assumption
    Eiichiro Fujisaki
    Tatsuaki Okamoto
    David Pointcheval
    Jacques Stern
    [J]. Journal of Cryptology, 2004, 17 : 81 - 104
  • [10] The Attack of the RSA Subgroup Assumption
    Weng, Jiang
    Dou, Yun-Qi
    Ma, Chuan-Gui
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (03) : 597 - 610