On the Tightness of Forward-Secure Signature Reductions

被引:3
|
作者
Abdalla, Michel [1 ,2 ]
Benhamouda, Fabrice [3 ]
Pointcheval, David [1 ]
机构
[1] PSL Res Univ, CNRS, ENS, Dept Informat, F-75005 Paris, France
[2] INRIA, Paris, France
[3] IBM Res, Yorktown Hts, NY USA
关键词
Forward security; Digital signatures; Reduction tightness; Lossy identification; ZERO-KNOWLEDGE PROTOCOLS; FIAT-SHAMIR TRANSFORM; IDENTIFICATION; SCHEMES; ASSUMPTIONS; FRAMEWORK; PROOFS;
D O I
10.1007/s00145-018-9283-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shamir transform and show that they can admit tighter reductions to certain decisional complexity assumptions such as the quadratic-residuosity, the high-residuosity, and the phi-hiding assumptions. We do so by proving that the underlying identification schemes used in these schemes are a particular case of the lossy identification notion introduced by Abdalla et al. at Eurocrypt 2012. Next, we show how to extend these results to the forward-security setting based on ideas from the Itkis-Reyzin forward-secure signature scheme. Unlike the original Itkis-Reyzin scheme, our construction can be instantiated under different decisional complexity assumptions and has a much tighter security reduction. Moreover, we also show that the tighter security reductions provided by our proof methodology can result in concrete efficiency gains in practice, both in the standard and forward-security setting, as long as the use of stronger security assumptions is deemed acceptable. Finally, we investigate the design of forward-secure signature schemes whose security reductions are fully tight.
引用
收藏
页码:84 / 150
页数:67
相关论文
共 50 条
  • [21] Forward-Secure Group Signatures from Lattices
    Ling, San
    Khoa Nguyen
    Wang, Huaxiong
    Xu, Yanhong
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 44 - 64
  • [22] Non-Interactive Forward-Secure Threshold Signature without Random Oracles
    Yu, Jia
    Kong, Fan-Yu
    Zhao, Hua-Wei
    Cheng, Xiang-Guo
    Hao, Rong
    Guo, Xiang-Fa
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (03) : 571 - 586
  • [23] One forward-secure signature scheme using bilinear maps and its applications
    Yu, Jia
    Kong, Fanyu
    Cheng, Xiangguo
    Hao, Rong
    Li, Guowen
    INFORMATION SCIENCES, 2014, 279 : 60 - 76
  • [24] Forward-Secure Group Signature Based On Conic Curve Over Ring Zn
    Li, Hui
    Li, Henan
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [25] Security Analysis of Two Forward-Secure Threshold Signature Schemes from ICCIS
    Wang, Hong
    Qiu, Gang
    Wei, Shimin
    Zuo, Zepeng
    2011 AASRI CONFERENCE ON APPLIED INFORMATION TECHNOLOGY (AASRI-AIT 2011), VOL 2, 2011, : 174 - 177
  • [26] Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments
    Yu, Jia
    Xia, Hui
    Zhao, Huawei
    Hao, Rong
    Fu, Zhangjie
    Cheng, Xiangguo
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 86 (03) : 1467 - 1491
  • [27] Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments
    Jia Yu
    Hui Xia
    Huawei Zhao
    Rong Hao
    Zhangjie Fu
    Xiangguo Cheng
    Wireless Personal Communications, 2016, 86 : 1467 - 1491
  • [28] Forward-Secure Hierarchical Predicate Encryption
    Nieto, Juan Manuel Gonzalez
    Manulis, Mark
    Sun, Dongdong
    COMPUTER JOURNAL, 2014, 57 (04) : 510 - 536
  • [29] Forward-Secure Linkable Ring Signatures
    Boyen, Xavier
    Haines, Thomas
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 245 - 264
  • [30] Transferable e-cheques using Forward-Secure Multi-signature Scheme
    Sunitha, N. R.
    Amberker, B. B.
    Koulgi, Prashant
    WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, : 257 - 262