Secure Obfuscation for Encrypted Signatures

被引:0
|
作者
Hada, Satoshi [1 ]
机构
[1] IBM Res, Tokyo, Japan
来源
关键词
Obfuscation; encrypted signatures; signcryption; bilinear map; IDENTITY-BASED ENCRYPTION; WEIL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Obfuscation is one of the most intriguing open problems in cryptography and only a few positive results are known. In TCC'07, Hohenberger et al. proposed an obfuscator for a re-encryption functionality, which takes a ciphertext for a message encrypted under Alice's public key and transforms it into a ciphertext for the same message under Bob's public key [24]. It is the first complicated cryptographic functionality that can be securely obfuscated, but obfuscators for such cryptographic functionalities are still elusive. In this paper, we consider obfuscation for encrypted signature (ES) functionalities, which generate a signature on a given message under Alice's secret signing key and encrypt the signature under Bob's public encryption key. We propose a special ES functionality, which is the sequential composition of Waters's signature scheme [33] and the linear encryption scheme proposed by Boneh, Boyen, and Shoehorn [5], and construct a secure obfuscator for it. We follow the security argument by Hohenberger et al. to prove that our proposed obfuscator satisfies a virtual black-box property (VBP), which guarantees that the security of the signature scheme is preserved even when adversaries are given an obfuscated program. Our security argument is in the standard model.
引用
下载
收藏
页码:92 / 112
页数:21
相关论文
共 50 条
  • [1] Secure Obfuscation of Encrypted Verifiable Encrypted Signatures
    Cheng, Rong
    Zhang, Bo
    Zhang, Fangguo
    PROVABLE SECURITY, 2011, 6980 : 188 - 203
  • [2] Secure obfuscation for encrypted threshold signatures
    Li Y.
    Wang C.
    Zhang Y.
    Yang X.
    Huang H.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (06): : 61 - 69
  • [3] Secure Obfuscation for Encrypted Group Signatures
    Shi, Yang
    Zhao, Qinpei
    Fan, Hongfei
    Liu, Qin
    PLOS ONE, 2015, 10 (07):
  • [4] Secure Obfuscation for Tightly Structure-Preserving Encrypted Proxy Signatures
    Wei, Xing
    Yuan, Zheng
    Li, Xian
    Feng, Xiao
    Liu, Jintao
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 589 - 593
  • [5] Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
    Ryo Nishimaki
    Keita Xagawa
    Designs, Codes and Cryptography, 2015, 77 : 61 - 98
  • [6] Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES
    Nishimaki, Ryo
    Xagawa, Keita
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 405 - 422
  • [7] Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
    Nishimaki, Ryo
    Xagawa, Keita
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (01) : 61 - 98
  • [8] Secure Boolean Queries over Encrypted Data from Indistinguishability Obfuscation
    Yao, Jing
    Cui, Helei
    Gui, Xiaolin
    2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 49 - 56
  • [9] Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks
    Zhang, Yudi
    He, Debiao
    Li, Yumei
    Zhang, Mingwu
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2020, 14 (04): : 5320 - 5328
  • [10] Encrypted-Input Obfuscation of Image Classifiers
    Di Crescenzo, Giovanni
    Bahler, Lisa
    Coan, Brian A.
    Rohloff, Kurt
    Cousins, David B.
    Polyakov, Yuriy
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 136 - 156