On the Tightness of Forward-Secure Signature Reductions

被引:3
|
作者
Abdalla, Michel [1 ,2 ]
Benhamouda, Fabrice [3 ]
Pointcheval, David [1 ]
机构
[1] PSL Res Univ, CNRS, ENS, Dept Informat, F-75005 Paris, France
[2] INRIA, Paris, France
[3] IBM Res, Yorktown Hts, NY USA
关键词
Forward security; Digital signatures; Reduction tightness; Lossy identification; ZERO-KNOWLEDGE PROTOCOLS; FIAT-SHAMIR TRANSFORM; IDENTIFICATION; SCHEMES; ASSUMPTIONS; FRAMEWORK; PROOFS;
D O I
10.1007/s00145-018-9283-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shamir transform and show that they can admit tighter reductions to certain decisional complexity assumptions such as the quadratic-residuosity, the high-residuosity, and the phi-hiding assumptions. We do so by proving that the underlying identification schemes used in these schemes are a particular case of the lossy identification notion introduced by Abdalla et al. at Eurocrypt 2012. Next, we show how to extend these results to the forward-security setting based on ideas from the Itkis-Reyzin forward-secure signature scheme. Unlike the original Itkis-Reyzin scheme, our construction can be instantiated under different decisional complexity assumptions and has a much tighter security reduction. Moreover, we also show that the tighter security reductions provided by our proof methodology can result in concrete efficiency gains in practice, both in the standard and forward-security setting, as long as the use of stronger security assumptions is deemed acceptable. Finally, we investigate the design of forward-secure signature schemes whose security reductions are fully tight.
引用
收藏
页码:84 / 150
页数:67
相关论文
共 50 条
  • [1] On the Tightness of Forward-Secure Signature Reductions
    Michel Abdalla
    Fabrice Benhamouda
    David Pointcheval
    Journal of Cryptology, 2019, 32 : 84 - 150
  • [2] Tighter Reductions for Forward-Secure Signature Schemes
    Abdalla, Michel
    Ben Hamouda, Fabrice
    Pointcheval, David
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 292 - 311
  • [3] A new forward-secure digital signature scheme
    Abdalla, M
    Reyzin, L
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 116 - 129
  • [4] Forward-secure threshold signature schemes
    Abdalla, M
    Miner, S
    Namprempre, C
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 441 - 456
  • [5] Forward-secure ID based digital signature scheme with forward-secure private key generator
    Oh, Hyunok
    Kim, Jihye
    Shin, Ji Sun
    INFORMATION SCIENCES, 2018, 454 : 96 - 109
  • [6] Some Aggregate Forward-Secure Signature Schemes
    Sunitha, N. R.
    Amberker, B. B.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (01): : 84 - 90
  • [7] Some Aggregate Forward-Secure Signature Schemes
    Sunitha, N. R.
    Amberker, B. B.
    2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 1154 - +
  • [8] Forward-secure multisignature and blind signature schemes
    Chow, SSM
    Hui, LCK
    Yiu, SM
    Chow, KP
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 895 - 908
  • [9] A Proxy Multi-Signature Scheme with Forward-Secure
    Liang, Xiang-Qian
    Zhang, Yun
    Zhang, Yong-Hua
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 794 - 798
  • [10] A Forward-Secure Certificate-Based Signature Scheme
    Li, Jiguo
    Teng, Huiyun
    Huang, Xinyi
    Zhang, Yichen
    Zhou, Jianying
    COMPUTER JOURNAL, 2015, 58 (04) : 853 - 866