Count Me In! Extendability for Threshold Ring Signatures

被引:7
作者
Aranha, Diego F. [1 ]
Hall-Andersen, Mathias [1 ]
Nitulescu, Anca [3 ]
Pagnin, Elena [2 ]
Yakoubov, Sophia [1 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
[2] Lund Univ, Lund, Sweden
[3] Protocol Labs, Wilmington, DE USA
来源
PUBLIC-KEY CRYPTOGRAPHY, PKC 2022, PT II | 2022年 / 13178卷
基金
欧洲研究理事会;
关键词
Threshold ring signatures; Anonymity; Extendability;
D O I
10.1007/978-3-030-97131-1_13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ring signatures enable a signer to sign a message on behalf of a group anonymously, without revealing her identity. Similarly, threshold ring signatures allow several signers to sign the same message on behalf of a group; while the combined signature reveals that some threshold t of the group members signed the message, it does not leak anything else about the signers' identities. Anonymity is a central feature in threshold ring signature applications, such as whistleblowing, e-voting and privacy-preserving cryptocurrencies: it is often crucial for signers to remain anonymous even from their fellow signers. When the generation of a signature requires interaction, this is difficult to achieve. There exist threshold ring signatures with non-interactive signing-where signers locally produce partial signatures which can then be aggregated-but a limitation of existing threshold ring signature constructions is that all of the signers must agree on the group on whose behalf they are signing, which implicitly assumes some coordination amongst them. The need to agree on a group before generating a signature also prevents others-from outside that group-from endorsing a message by adding their signature to the statement post-factum. We overcome this limitation by introducing extendability for ring signatures, same-message linkable ring signatures, and threshold ring signatures. Extendability allows an untrusted third party to take a signature, and extend it by enlarging the anonymity set to a larger set. In the extendable threshold ring signature, two signatures on the same message which have been extended to the same anonymity set can then be combined into one signature with a higher threshold. This enhances signers' anonymity, and enables new signers to anonymously support a statement already made by others. For each of those primitives, we formalize the syntax and provide a meaningful security model which includes different flavors of anonymous extendability. In addition, we present concrete realizations of each primitive and formally prove their security relying on signatures of knowledge and the hardness of the discrete logarithm problem. We also describe a generic transformation to obtain extendable threshold ring signatures from same-message-linkable extendable ring signatures. Finally, we implement and benchmark our constructions.
引用
收藏
页码:379 / 406
页数:28
相关论文
共 30 条
  • [1] [Anonymous], 2006, P ACM S INF COMP COM
  • [2] Bender A, 2006, LECT NOTES COMPUT SC, V3876, P60
  • [3] High-speed high-security signatures
    Bernstein, Daniel J.
    Duif, Niels
    Lange, Tanja
    Schwabe, Peter
    Yang, Bo-Yin
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (02) : 77 - 89
  • [4] Bettaieb S, 2013, LECT NOTES COMPUT SC, V7932, P34, DOI 10.1007/978-3-642-38616-9_3
  • [5] Beullens W., 2020, 2020646 CRYPTOLOGY E
  • [6] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [7] Short Accountable Ring Signatures Based on DDH
    Bootle, Jonathan
    Cerulli, Andrea
    Chaidos, Pyrros
    Ghadafi, Essam
    Groth, Jens
    Petit, Christophe
    [J]. COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 243 - 265
  • [8] Constant Size Ring Signature Without Random Oracle
    Bose, Priyanka
    Das, Dipanjan
    Rangan, Chandrasekharan Pandu
    [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 230 - 247
  • [9] Bresson E, 2002, LECT NOTES COMPUT SC, V2442, P465
  • [10] Brickell E.F., 2004, ACM CCS 2004, P132, DOI DOI 10.1109/TSC.2010.60