Secure Obfuscation for Encrypted Signatures

被引:0
|
作者
Hada, Satoshi [1 ]
机构
[1] IBM Res, Tokyo, Japan
来源
关键词
Obfuscation; encrypted signatures; signcryption; bilinear map; IDENTITY-BASED ENCRYPTION; WEIL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Obfuscation is one of the most intriguing open problems in cryptography and only a few positive results are known. In TCC'07, Hohenberger et al. proposed an obfuscator for a re-encryption functionality, which takes a ciphertext for a message encrypted under Alice's public key and transforms it into a ciphertext for the same message under Bob's public key [24]. It is the first complicated cryptographic functionality that can be securely obfuscated, but obfuscators for such cryptographic functionalities are still elusive. In this paper, we consider obfuscation for encrypted signature (ES) functionalities, which generate a signature on a given message under Alice's secret signing key and encrypt the signature under Bob's public encryption key. We propose a special ES functionality, which is the sequential composition of Waters's signature scheme [33] and the linear encryption scheme proposed by Boneh, Boyen, and Shoehorn [5], and construct a secure obfuscator for it. We follow the security argument by Hohenberger et al. to prove that our proposed obfuscator satisfies a virtual black-box property (VBP), which guarantees that the security of the signature scheme is preserved even when adversaries are given an obfuscated program. Our security argument is in the standard model.
引用
下载
收藏
页码:92 / 112
页数:21
相关论文
共 50 条
  • [21] Encrypted Computing Speed, Security and Provable Obfuscation against Insiders
    Breuer, Peter T.
    Bowen, Jonathan P.
    Palomar, Esther
    Liu, Zhiming
    2017 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2017,
  • [22] Secure Obfuscation in a Weak Multilinear Map Model
    Garg, Sanjam
    Miles, Eric
    Mukherjee, Pratyay
    Sahai, Amit
    Srinivasan, Akshayaram
    Zhandry, Mark
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 241 - 268
  • [23] Fully Secure and Fast Signing from Obfuscation
    Ramchen, Kim
    Waters, Brent
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 659 - 673
  • [24] Secure and Efficient Traffic Obfuscation for Smart Home
    He, Gaofeng
    Xiao, Xiancai
    Chen, Renhong
    Zhu, Haiting
    Zhang, Zhaowei
    Xu, Bingfeng
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6073 - 6078
  • [25] NetHide: Secure and Practical Network Topology Obfuscation
    Meier, Roland
    Tsankov, Petar
    Lenders, Vincent
    Vanbever, Laurent
    Vechev, Martin
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 693 - 709
  • [26] Secure Ranking over Encrypted Documents
    Zhang, Jiuling
    Deng, Beixing
    Li, Xing
    Zhang, Xiao-lei
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (12): : 2954 - 2955
  • [27] Secure kNN Computation on Encrypted Databases
    Wong, W. K.
    Cheung, David W.
    Kao, Ben
    Mamoulis, Nikos
    ACM SIGMOD/PODS 2009 CONFERENCE, 2009, : 139 - 152
  • [28] Designing secure indexes for encrypted databases
    Shmueli, E
    Waisenberg, R
    Elovici, Y
    Gudes, E
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 54 - 68
  • [29] Why Your Encrypted Database Is Not Secure
    Grubbs, Paul
    Ristenpart, Thomas
    Shmatikov, Vitaly
    PROCEEDINGS OF THE 16TH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS (HOTOS 2017), 2017, : 162 - 168
  • [30] Architecture and design of a secure encrypted microprocessor
    Liu, Zhenglin
    Gong, Mingyang
    Liu, Zheng
    Huo, Wenjie
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (08): : 81 - 84