Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys

被引:37
作者
Fleischhacker, Nils [1 ]
Krupp, Johannes [1 ]
Malavolta, Giulio [1 ]
Schneider, Jonas [1 ]
Schroeder, Dominique [1 ]
Simkin, Mark [1 ]
机构
[1] Saarland Univ, CISPA, Saarbrucken, Germany
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I | 2016年 / 9614卷
关键词
PROGRAMMABLE HASH FUNCTIONS; REDACTABLE SIGNATURES; SECURITY; CONSTRUCTION; DEFINITIONS;
D O I
10.1007/978-3-662-49384-7_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a sanitizable signature scheme the signer allows a designated third party, called the sanitizer, to modify certain parts of the message and adapt the signature accordingly. Ateniese et al. (ESORICS 2005) introduced this primitive and proposed five security properties which were formalized by Brzuska et al. (PKC 2009). Subsequently, Brzuska et al. (PKC 2010) suggested an additional security notion, called unlinkability which says that one cannot link sanitized message-signature pairs of the same document. Moreover, the authors gave a generic construction based on group signatures that have a certain structure. However, the special structure required from the group signature scheme only allows for inefficient instantiations. Here, we present the first efficient instantiation of unlinkable sanitizable signatures. Our construction is based on a novel type of signature schemes with re-randomizable keys. Intuitively, this property allows to re-randomize both the signing and the verification key separately but consistently. This allows us to sign the message with a re-randomized key and to prove in zero-knowledge that the derived key originates from either the signer or the sanitizer. We instantiate this generic idea with Schnorr signatures and efficient Sigma-protocols, which we convert into non-interactive zero-knowledge proofs via the Fiat-Shamir transformation. Our construction is at least one order of magnitude faster than instantiating the generic scheme of Brzuska et al. with the most efficient group signature schemes.
引用
收藏
页码:301 / 330
页数:30
相关论文
共 42 条
  • [1] [Anonymous], 2002, Information Security and Cryptology-ICISC 2001, DOI DOI 10.1007/3-540-45861-1
  • [2] Ateniese G, 2005, LECT NOTES COMPUT SC, V3679, P159
  • [3] Attrapadung N, 2013, LECT NOTES COMPUT SC, V7778, P386, DOI 10.1007/978-3-642-36362-7_24
  • [4] Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P614
  • [5] Bellare M, 2014, LECT NOTES COMPUT SC, V8383, P520, DOI 10.1007/978-3-642-54631-0_30
  • [6] Boldyreva A., 2003, 2003096 CRYPT EPRINT
  • [7] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
  • [8] Short signatures without random oracles and the SDH assumption in bilinear groups
    Boneh, Dan
    Boyen, Xavier
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (02) : 149 - 177
  • [9] Boneh D, 2011, LECT NOTES COMPUT SC, V6632, P149, DOI 10.1007/978-3-642-20465-4_10
  • [10] Boyle E, 2014, LECT NOTES COMPUT SC, V8383, P501, DOI 10.1007/978-3-642-54631-0_29