Tightly-Secure Signatures from Chameleon Hash Functions

被引:48
作者
Blazy, Olivier [1 ]
Kakvi, Saqib A. [2 ,3 ]
Kiltz, Eike [2 ,3 ]
Pan, Jiaxin [2 ,3 ]
机构
[1] Univ Limoges, XLim, Limoges, France
[2] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[3] Ruhr Univ Bochum, Fac Math, Bochum, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015 | 2015年 / 9020卷
关键词
Signature; Standard model; Tight reduction; Chameleon hash; SCHEME; REDUCTIONS; ENCRYPTION; SIGN; RSA;
D O I
10.1007/978-3-662-46447-2_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We give a new framework for obtaining signatures with a tight security reduction from standard hardness assumptions. Concretely, we show that any Chameleon Hash function can be transformed into a (binary) tree-based signature scheme with tight security. The transformation is in the standard model, i.e., it does not make use of any random oracle. For specific assumptions (such as RSA, Diffie-Hellman and Short Integer Solution (SIS)) we further manage to obtain a more efficient flat-tree construction. Our framework explains and generalizes most of the existing schemes as well as providing a generic means for constructing tight signature schemes based on arbitrary assumptions, which improves the standard Merkle tree transformation. Moreover, we obtain the first tightly secure signature scheme from the SIS assumption and several schemes based on Diffie-Hellman in the standard model. Some of our signature schemes can (using known techniques) be combined with Groth-Sahai proof methodology to yield tightly secure and efficient simulation-sound NIZK proofs of knowledge and CCA-secure encryption in the multi-user/-challenge setting under classical assumptions.
引用
收藏
页码:256 / 279
页数:24
相关论文
共 45 条
[1]  
Abe M, 2013, LECT NOTES COMPUT SC, V7778, P312, DOI 10.1007/978-3-642-36362-7_20
[2]  
Abe M, 2010, LECT NOTES COMPUT SC, V6223, P209, DOI 10.1007/978-3-642-14623-7_12
[3]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[4]  
[Anonymous], 2000, NDSS
[5]  
Bader C., 2014, 2014797 CRYPT EPRINT
[6]  
Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
[7]  
Bellare M, 2007, LECT NOTES COMPUT SC, V4450, P201
[8]   A Characterization of Chameleon Hash Functions and New, Efficient Designs [J].
Bellare, Mihir ;
Ristov, Todor .
JOURNAL OF CRYPTOLOGY, 2014, 27 (04) :799-823
[9]  
Blazy O., 2014, 20141021 CRYPT EPRIN
[10]  
Blazy O, 2014, LECT NOTES COMPUT SC, V8616, P408, DOI 10.1007/978-3-662-44371-2_23