Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs

被引:0
|
作者
ChunMing Tang
DingYi Pei
XiaoFeng Wang
ZhuoJun Liu
机构
[1] Institute of Information Security of Guangzhou University,Province Key Laboratory
[2] Chinese Academy of Sciences,State Key Laboratory of Information Security
[3] School of Mathematics and Computational Mathematics of Shenzhen University,Academy of Mathematics and Systems Science
[4] Chinese Academy of Sciences,undefined
关键词
delegateable signature; non-interactive zero-knowledge; non-interactive witness indistinguishable; non-interactive witness hiding; Σ-protocol;
D O I
暂无
中图分类号
学科分类号
摘要
A delegateable signature scheme (DSS) which was first introduced by Barak is mainly based on the non-interactive zero-knowledge proof (NIZK) for preventing the signing verifier from telling which witness (i.e., restricted subset) is being used. However, the scheme is not significantly efficient due to the difficulty of constructing NIZK. We first show that a non-interactive witness indistinguishable (NIWI) proof system and a non-interactive witness hiding (NIWH) proof system are easier and more efficient proof models than NIZK in some cases. Furthermore, the witnesses employed in these two protocols (NIWI and NIWT) cannot also be distinguished by the verifiers. Combined with the Σ-protocol, we then construct NIWI and NIWH proofs for any NP statement under the existence of one-way functions and show that each proof is different from those under the existence of trapdoor permutations. Finally, based on our NIWI and NIWH proofs, we construct delegateable signature schemes under the existence of one-way functions, which are more efficient than Barak’s scheme under the existence of trapdoor permutations.
引用
收藏
页码:128 / 144
页数:16
相关论文
共 50 条
  • [41] Signcryption with Non-interactive Non-repudiation
    John Malone-Lee
    [J]. Designs, Codes and Cryptography, 2005, 37 : 81 - 109
  • [42] Better than Advertised Security for Non-interactive Threshold Signatures
    Bellare, Mihir
    Crites, Elizabeth
    Komlo, Chelsea
    Maller, Mary
    Tessaro, Stefano
    Zhu, Chenzhi
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT IV, 2022, 13510 : 517 - 550
  • [43] Communication-efficient non-interactive proofs of knowledge with online extractors
    Fischlin, M
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 152 - 168
  • [44] Succinct non-interactive zero-knowledge proofs with preprocessing for LOGSNP
    Kalai, Yael Tauman
    Raz, Ran
    [J]. 47TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2006, : 355 - +
  • [45] Signcryption with non-interactive non-repudiation
    Malone-Lee, J
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2005, 37 (01) : 81 - 109
  • [46] Non-Interactive Secure Multiparty Computation
    Beimel, Amos
    Gabizon, Ariel
    Ishai, Yuval
    Kushilevitz, Eyal
    Meldgaard, Sigurd
    Paskin-Cherniaysky, Anat
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 387 - 404
  • [47] Reusable Non-Interactive Secure Computation
    Chase, Melissa
    Dodis, Yevgeniy
    Ishai, Yuval
    Kraschewski, Daniel
    Liu, Tianren
    Ostrovsky, Rafail
    Vaikuntanathan, Vinod
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 462 - 488
  • [48] A non-interactive multiple model tracker
    Alouani, AT
    Gray, JE
    [J]. ACQUISITION, TRACKING, AND POINTING XVII, 2003, 5082 : 65 - 76
  • [49] A Survey of Non-Interactive Key Exchange
    Zhang M.-R.
    Zhang R.
    Zhang L.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 558 - 574
  • [50] Information management in interactive and non-interactive suspenseful storytelling
    Delatorre, Pablo
    Leon, Carlos
    Salguero, Alberto
    Palomo-Duarte, Manuel
    Gervas, Pablo
    [J]. CONNECTION SCIENCE, 2019, 31 (01) : 82 - 101