A Lattice-Based Group Signature Scheme with Message-Dependent Opening

被引:30
作者
Libert, Benoit [1 ]
Mouhartem, Fabrice [1 ]
Khoa Nguyen [2 ]
机构
[1] Ecole Normale Super Lyon, Lyon, France
[2] Nanyang Technol Univ, Singapore, Singapore
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016 | 2016年 / 9696卷
关键词
Group signatures; Anonymity; Lattice assumptions; SECURITY;
D O I
10.1007/978-3-319-39555-5_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Group signatures are an important anonymity primitive allowing users to sign messages while hiding in a crowd. At the same time, signers remain accountable since an authority is capable of de-anonymizing signatures via a process called opening. In many situations, this authority is granted too much power as it can identify the author of any signature. Sakai et al. proposed a flavor of the primitive, called Group Signature with Message-Dependent Opening (GS-MDO), where opening operations are only possible when a separate authority (called "admitter") has revealed a trapdoor for the corresponding message. So far, all existing GS-MDO constructions rely on bilinear maps, partially because the message-dependent opening functionality inherently implies identity-based encryption. This paper proposes the first GS-MDO candidate based on lattice assumptions. Our construction combines the group signature of Ling, Nguyen and Wang (PKC' 15) with two layers of identity-based encryption. These components are tied together using suitable zero-knowledge argument systems.
引用
收藏
页码:137 / 155
页数:19
相关论文
共 42 条
  • [1] Abdalla M, 2004, LECT NOTES COMPUT SC, V3269, P1
  • [2] Alwen J, 2009, STACS 2009
  • [3] [Anonymous], 2005, STOC 2005
  • [4] [Anonymous], 2016101 CRYPT EPRINT
  • [5] Ateniese G, 2000, LECT NOTES COMPUT SC, V1880, P255
  • [6] Banaszczyk W., 1993, MATH ANN
  • [7] Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P614
  • [8] Benhamouda F, 2014, LECT NOTES COMPUT SC, V8873, P551, DOI 10.1007/978-3-662-45611-8_29
  • [9] Short group signatures
    Boneh, D
    Boyen, X
    Shacham, H
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 41 - 55
  • [10] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615