Practical Signatures from Standard Assumptions

被引:0
|
作者
Boehl, Florian [1 ]
Hofheinz, Dennis [1 ]
Jager, Tibor [2 ]
Koch, Jessica [1 ]
Seo, Jae Hong [3 ]
Striecks, Christoph [1 ]
机构
[1] Karlsruhe Inst Technol, D-76021 Karlsruhe, Germany
[2] Ruhr Univ Bochum, Bochum, Germany
[3] Myongji Univ, Yongin, South Korea
来源
关键词
digital signatures; CDH assumption; pairing-friendly groups; RSA assumption; SIS assumption; SECURE; ENCRYPTION; SCHEME; TRAPDOORS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We put forward new techniques for designing signature schemes. As a result, we present practical signature schemes based on the CDH, the RSA, and the SIS assumptions. Our schemes compare favorably with existing schemes based on these assumptions. Our core idea is the use of tag-based signatures. Concretely, each signatures contains a tag which is uniformly chosen from a suitable tag set. Intuitively, the tag provides a way to embed instances of computational problems. Indeed, carefully choosing these tag spaces provides new ways to partition the set of possible message-tag pairs into "signable" and "unsignable" pairs. In our security proof, we will thus be able to sign all adversarially requested messages, and at the same time use an adversarially generated forgery with suitably large probability.
引用
收藏
页码:461 / 485
页数:25
相关论文
共 50 条
  • [21] Kleptography from Standard Assumptions and Applications
    Young, Adam
    Yung, Moti
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 271 - 290
  • [22] Practical (fully) distributed signatures provably secure in the standard model
    Wang, Yujue
    Wong, Duncan S.
    Wu, Qianhong
    Chow, Sherman S. M.
    Qin, Bo
    Liu, Jianwei
    Ding, Yong
    [J]. THEORETICAL COMPUTER SCIENCE, 2015, 595 : 143 - 158
  • [23] Practical Round-Optimal Blind Signatures in the Standard Model
    Fuchsbauer, Georg
    Hanser, Christian
    Slamanig, Daniel
    [J]. ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 233 - 253
  • [24] A Short Paper on Blind Signatures from Knowledge Assumptions
    Hanzlik, Lucjan
    Kluczniak, Kamil
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 535 - 543
  • [25] Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions
    Mitrokotsa, Aikaterini
    Mukherjee, Sayantan
    Sedaghat, Mandi
    Slamanig, Daniel
    Tomy, Jenit
    [J]. PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 163 - 195
  • [26] Verifiable Random Functions from Standard Assumptions
    Hofheinz, Dennis
    Jager, Tibor
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 : 336 - 362
  • [27] Secure Software Leasing from Standard Assumptions
    Kitagawa, Fuyuki
    Nishimaki, Ryo
    Yamakawa, Takashi
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 31 - 61
  • [28] Limits of Provable Security From Standard Assumptions
    Pass, Rafael
    [J]. STOC 11: PROCEEDINGS OF THE 43RD ACM SYMPOSIUM ON THEORY OF COMPUTING, 2011, : 109 - 118
  • [29] Practical group signatures from RSA
    Cui, Shi
    Cheng, Xiangguo
    Chan, Choong Wah
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 121 - +
  • [30] Pairing-Free Blind Signatures from CDH Assumptions
    Chairattana-Apirom, Rutchathon
    Tessaro, Stefano
    Zhu, Chenzhi
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT I, 2024, 14920 : 174 - 209