Convertible Nominative Signatures from Standard Assumptions without Random Oracles

被引:0
|
作者
Hanaoka, Goichiro [1 ]
Schuldt, Jacob [1 ]
机构
[1] Natl Inst Ind Sci & Technol AIST, Adv Cryptosyst Res Grp, Tokyo 1350064, Japan
关键词
user certification; nominative signatures; standard model; SECURITY; ENCRYPTION; KNOWLEDGE;
D O I
10.1587/transfun.E99.A.1107
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While standard signatures provide an efficient mechanism for information certification, the lack of privacy protecting measures makes them unsuitable if sensitive or confidential information is being certified. In this paper, we revisit nominative signatures, first introduced by Kim, Park and Won, which provides the functionality and security guarantees required to implement a certification system allowing the user ( and not the authority) to control the verifiability of an obtained certificate. Unlike systems based on related primitives, the use of nominative signatures protects the user against authority information leaks and impersonation attacks based on these. We refine the security model of nominative signatures, and propose a new efficient scheme which is provably secure based on the computational Diffie-Hellman problem and the decisional linear problem. To the best of our knowledge, our scheme is the the only nominative signature scheme which is provably secure in the standard model based on standard assumptions. Furthermore, unlike most previous schemes, the proposed scheme provides signatures which hide both the signer and user identity. Hence, through our nominative signature scheme, we achieve an efficient non-transferable user certification scheme with strong security guarantees.
引用
收藏
页码:1107 / 1121
页数:15
相关论文
共 50 条
  • [1] Ambiguous One-Move Nominative Signature Without Random Oracles
    Liu, Dennis Y. W.
    Wong, Duncan S.
    Huang, Qiong
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 325 - 341
  • [2] Short and efficient convertible undeniable signature schemes without random oracles
    Huang, Qiong
    Wong, Duncan S.
    THEORETICAL COMPUTER SCIENCE, 2013, 476 : 67 - 83
  • [3] Practical verifiably encrypted signatures without random oracles
    Shao, Zuhua
    Gao, Yipeng
    INFORMATION SCIENCES, 2014, 278 : 793 - 801
  • [4] Efficient digital signatures from RSA without random oracles
    Seo, Jae Hong
    INFORMATION SCIENCES, 2020, 512 (512) : 471 - 480
  • [5] Short Group Signatures Without Random Oracles
    秦波
    伍前红
    Willy Susilo
    穆怡
    王育民
    姜正涛
    Journal of Computer Science & Technology, 2007, (06) : 805 - 821
  • [6] Short group signatures without random oracles
    Qin, Bo
    Wu, Qian-Hong
    Susilo, Willy
    Mu, Yi
    Wang, Yu-Min
    Jiang, Zheng-Tao
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (06) : 805 - 821
  • [7] Short Group Signatures Without Random Oracles
    Bo Qin
    Qian-Hong Wu
    Willy Susilo
    Yi Mu
    Yu-Min Wang
    Zheng-Tao Jiang
    Journal of Computer Science and Technology, 2007, 22 : 805 - 821
  • [8] Fair Blind Signatures without Random Oracles
    Fuchsbauer, Georg
    Vergnaud, Damien
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 16 - 33
  • [9] Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
    Rueckert, Markus
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 6061 : 182 - 200
  • [10] One-move convertible nominative signature in the standard model
    Liu, Dennis Y. W.
    Wong, Duncan S.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1796 - 1809