On the Tightness of Forward-Secure Signature Reductions

被引:3
作者
Abdalla, Michel [1 ,2 ]
Benhamouda, Fabrice [3 ]
Pointcheval, David [1 ]
机构
[1] PSL Res Univ, CNRS, ENS, Dept Informat, F-75005 Paris, France
[2] INRIA, Paris, France
[3] IBM Res, Yorktown Hts, NY USA
关键词
Forward security; Digital signatures; Reduction tightness; Lossy identification; ZERO-KNOWLEDGE PROTOCOLS; FIAT-SHAMIR TRANSFORM; IDENTIFICATION; SCHEMES; ASSUMPTIONS; FRAMEWORK; PROOFS;
D O I
10.1007/s00145-018-9283-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shamir transform and show that they can admit tighter reductions to certain decisional complexity assumptions such as the quadratic-residuosity, the high-residuosity, and the phi-hiding assumptions. We do so by proving that the underlying identification schemes used in these schemes are a particular case of the lossy identification notion introduced by Abdalla et al. at Eurocrypt 2012. Next, we show how to extend these results to the forward-security setting based on ideas from the Itkis-Reyzin forward-secure signature scheme. Unlike the original Itkis-Reyzin scheme, our construction can be instantiated under different decisional complexity assumptions and has a much tighter security reduction. Moreover, we also show that the tighter security reductions provided by our proof methodology can result in concrete efficiency gains in practice, both in the standard and forward-security setting, as long as the use of stronger security assumptions is deemed acceptable. Finally, we investigate the design of forward-secure signature schemes whose security reductions are fully tight.
引用
收藏
页码:84 / 150
页数:67
相关论文
共 50 条
  • [41] Forward-Secure Group Signatures from Pairings
    Nakanishi, Toru
    Hira, Yuta
    Funabiki, Nobuo
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 171 - 186
  • [42] Forward-Secure Revocable Secret Handshakes from Lattices
    An, Zhiyuan
    Pan, Jing
    Wen, Yamin
    Zhang, Fangguo
    POST-QUANTUM CRYPTOGRAPHY (PQCRYPTO 2022), 2022, 13512 : 453 - 479
  • [43] A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios
    Cao, Yibo
    Xu, Shiyuan
    Chen, Xue
    He, Yunhua
    Jiang, Shuo
    COMPUTER NETWORKS, 2022, 214
  • [44] Extended abstract: Forward-secure sequential aggregate authentication
    Ma, Di
    Tsudik, Gene
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 86 - +
  • [45] Generic Construction of Forward-Secure Chameleon Hash Function
    Wei, Pengxuan
    Matsubara, Koki
    Miyaji, Atsuko
    Tian, Yangguang
    MOBILE INTERNET SECURITY, MOBISEC 2023, 2024, 2095 : 136 - 151
  • [46] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [47] Forward-secure key evolution in wireless sensor networks
    Klonowski, Marek
    Kutylowski, Miroslaw
    Ren, Michal
    Rybarczyk, Katarzyna
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 102 - +
  • [48] Forward-Secure Revocable Identity-Based Encryption
    Qin, Baodong
    Bai, Xue
    Zheng, Dong
    Cui, Hui
    Luo, Yiyuan
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 321 - 340
  • [49] An Improved Forward-Secure Anonymous RFID Authentication Protocol
    Zhu, Han
    Zhao, Yiming
    Ding, Shenglong
    Jin, Bo
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [50] Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting
    Odoom, Justice
    Huang, Xiaofang
    Wang, Licheng
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 129