A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption

被引:2
作者
Kajita, Kaisei [1 ]
Ogawa, Kazuto [1 ]
Fujisaki, Eiichiro [2 ]
机构
[1] NHK Japan Broadcasting Corp, Sci & Technol Res Labs, Tokyo 1578310, Japan
[2] JAIST, Sch Informat Sci, Nomi Shi 9231292, Japan
基金
日本学术振兴会;
关键词
digital signature; CDH assumption; trapdoor commitment; tight security reduction; SECURE;
D O I
10.1587/transfun.2019CIP0015
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a constant-size signature scheme under the CDH assumption. It has a tighter security reduction than any other constant-size signature scheme with a security reduction to solving some intractable search problems. Hofheinz, Jager, and Knapp (PKC 2012) presented a constant-size signature scheme under the CDH assumption with a reduction loss of O(q), where q is the number of signing queries. They also proved that the reduction loss of O(q) is optimal in a black-box security proof. To the best of our knowledge, no constant-size signature scheme has been proposed with a tighter reduction (to the hardness of a search problem) than that proposed by Hofheinz et al., even if it is not re-randomizable. We remark that our scheme is not re-randomizable. We achieve the reduction loss of O(q/d), where d is the number of group elements in a public key.
引用
收藏
页码:141 / 149
页数:9
相关论文
共 27 条
  • [1] Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
    Abe, Masayuki
    Nishimaki, Ryo
    Chase, Melissa
    David, Bernardo
    Kohlweiss, Markulf
    Ohkubo, Miyako
    [J]. JOURNAL OF CRYPTOLOGY, 2016, 29 (04) : 833 - 878
  • [2] [Anonymous], 2001, ANN INT CRYPTOLOGY C
  • [3] [Anonymous], 2003, ACM CCS 2003
  • [4] Tightly-Secure Signatures from Chameleon Hash Functions
    Blazy, Olivier
    Kakvi, Saqib A.
    Kiltz, Eike
    Pan, Jiaxin
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 256 - 279
  • [5] Confined Guessing: New Signatures From Standard Assumptions
    Boehl, Florian
    Hofheinz, Dennis
    Koch, Jessica
    Striecks, Christoph
    Jager, Tibor
    [J]. JOURNAL OF CRYPTOLOGY, 2015, 28 (01) : 176 - 208
  • [6] Böhl F, 2013, LECT NOTES COMPUT SC, V7881, P461, DOI 10.1007/978-3-642-38348-9_28
  • [7] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
  • [8] Boneh D, 2003, LECT NOTES COMPUT SC, V2612, P98
  • [9] Boyen X, 2010, LECT NOTES COMPUT SC, V6056, P499
  • [10] Boyle E, 2014, LECT NOTES COMPUT SC, V8383, P501, DOI 10.1007/978-3-642-54631-0_29