More Efficient Digital Signatures with Tight Multi-user Security

被引:20
作者
Diemert, Denis [1 ]
Gellert, Kai [1 ]
Jager, Tibor [1 ]
Lyu, Lin [1 ]
机构
[1] Berg Univ Wuppertal, Wuppertal, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2021, PT II | 2021年 / 12711卷
基金
欧洲研究理事会;
关键词
IDENTIFICATION; PROOFS;
D O I
10.1007/978-3-030-75248-4_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We construct the currently most efficient signature schemes with tight multi-user security against adaptive corruptions. It is the first generic construction of such schemes, based on lossy identification schemes (Abdalla et al.; JoC 2016), and the first to achieve strong existential unforgeability. It also has significantly more compact signatures than the previously most efficient construction by Gjosteen and Jager (CRYPTO 2018). When instantiated based on the decisional Diffie-Hellman assumption, a signature consists of only three exponents. We propose a new variant of the generic construction of signatures from sequential OR-proofs by Abe, Ohkubo, and Suzuki (ASIACRYPT 2002) and Fischlin, Harasser, and Janson (EUROCRYPT 2020). In comparison to Fischlin et al., who focus on constructing signatures in the non-programmable random oracle model (NPROM), we aim to achieve tight security against adaptive corruptions, maximize efficiency, and to directly achieve strong existential unforgeability (also in the NPROM). This yields a slightly different construction and we use slightly different and additional properties of the lossy identification scheme. Signatures with tight multi-user security against adaptive corruptions are a commonly-used standard building block for tightly-secure authenticated key exchange protocols. We also show how our construction improves the efficiency of all existing tightly-secure AKE protocols.
引用
收藏
页码:1 / 31
页数:31
相关论文
共 37 条
[1]   Tightly Secure Signatures From Lossy Identification Schemes [J].
Abdalla, Michel ;
Fouque, Pierre-Alain ;
Lyubashevsky, Vadim ;
Tibouchi, Mehdi .
JOURNAL OF CRYPTOLOGY, 2016, 29 (03) :597-631
[2]  
Abdalla M, 2013, LECT NOTES COMPUT SC, V7778, P292, DOI 10.1007/978-3-642-36362-7_19
[3]  
Abdalla M, 2012, LECT NOTES COMPUT SC, V7237, P572, DOI 10.1007/978-3-642-29011-4_34
[4]  
Abe M, 2002, LECT NOTES COMPUT SC, V2501, P415
[5]   On the Impossibility of Tight Cryptographic Reductions [J].
Bader, Christoph ;
Jager, Tibor ;
Li, Yong ;
Schaege, Sven .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 :273-304
[6]   Tightly-Secure Authenticated Key Exchange [J].
Bader, Christoph ;
Hofheinz, Dennis ;
Jager, Tibor ;
Kiltz, Eike ;
Li, Yong .
THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 :629-658
[7]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P259
[8]  
Bellare M., 1994, LNCS, V773, P232, DOI DOI 10.1007/3-540-48329-2_21
[9]  
Cachin C, 1999, LECT NOTES COMPUT SC, V1592, P402
[10]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453