A New and Efficient Signature on Commitment Values
|
|
|
- Joseph Thomas
- 10 years ago
- Views:
Transcription
1 International Journal of Network Security, Vol.7, No., PP.0 06, July A New and Efficient Signature on Commitment Values Fangguo Zhang,3, Xiaofeng Chen 2,3, Yi Mu 4, and Willy Susilo 4 (Corresponding author: Fangguo Zhang) Department of Electronics and Communication Engineering, Sun Yat-Sen University Guangzhou 50275, P. R. China ( [email protected]) Department of Computer Science, Sun Yat-Sen University, Guangzhou 50275, P. R. China 2 Guangdong Key Laboratory of Information Security Technology Guangzhou 50275, P. R. China 3 School of IT and Computer Science University of Wollongong, Wollongong, NSW 2522, Australia 4 (Received July 5, 2006; revised and accepted Nov. 8, 2006) Abstract We present a new short signature scheme based on a variant of the Boneh-Boyen s short signatures schemes. Our short signature scheme is secure without requiring the random oracle model. We show how to prove a committed value embedded in our short signature. Using this primitive, we construct an efficient anonymous credential system. Keywords: Anonymity, anonymous credentials, commitment, signature Introduction Signature schemes are a central cryptographic primitive. Besides being an important stand-alone application, they also constitute a building block in many cryptographic protocols. One of important applications of signatures is anonymous credential. The notion of anonymous credential was introduce by Chaum []. A credential system allows a user to obtain credentials, and to prove that he has a given set of credentials. An anonymous credential system enables a user to work with his credentials without revealing any information not explicitly requested. A user should be able to obtain a credential without revealing his identity, and to prove that he has a set of credentials without revealing any information beyond that fact. To be useful for this application, a signature scheme must have efficient protocols for obtaining a signature on a hidden (committed) value, and for proving in zero-knowledge the knowledge of a signature. An anonymous credential system should meet some essential properties: It should be secure against attacks from a coalition of users. It should be able to be used for multiple times, i.e., so-called multi-show. It is also essential that one a credential has been issued to a user, it cannot be transferred to any one else, i.e. nontransferability. It is desirable that the overheads of communication and computation imposed by a credential system to users and services must not heavily affect their performance. The studies of anonymous credential have gone through several stages. After its introduction by Chaum, Brands presented a public key based construction of anonymous credential in which a user can provide in zero knowledge that the credentials encoded by its certificate satisfy a given linear Boolean formula [6]. This scheme allows only one show, namely, two transactions from the same user can be found performed by the same user. Camenisch and Lysyanskaya proposed an anonymous credential scheme based on the strong RSA assumption [7]. In this scheme, it is possible to unlinkably prove possession of a credential supporting multi-show property. There are several other schemes that are based on different security assumptions. Verheul recently proposed an efficient solution for multi-show credentials based on the security assumptions of Decisional Diffie-Hellman problem and Computational Diffie-Hellman problem [5]. Camenisch and Lysyanskaya recently also proposed generalized anonymous credential systems and showed how to construct them from known signature and encryption schemes []. As claimed by Camenisch and Lysyanskaya [8], in order to construct an anonymous credential system, it is sufficient to exhibit a commitment scheme, a signature scheme, and efficient protocols for () proving equality of two committed values; (2) getting a signature on a committed value (without revealing this value to the signer); and (3) proving knowledge of a signature on a committed value. In this paper, we propose a variant of Boneh-Boyen short signature scheme without random oracle such that it can be used as a building block for cryptographic protocols. We provide a protocol to prove knowledge of a sig-
2 International Journal of Network Security, Vol.7, No., PP.0 06, July nature on a committed message and to obtain a signature on a committed message. Our scheme can be naturally converted into an anonymous credential The organization of the rest of this paper is as follows. In the next section, we define the definitions and requirements for signature on commitment values. The Section 3 contains some preliminaries required throughout the paper. In Section 4, we present a variant of Boneh-Boyen short signature scheme without random oracle and give its security analysis. In Section 5 we propose a signature on a committed message. In Section 6, we present a basic anonymous credential system based the proposed signature Section 7 concludes this paper. 2 Definitions and Requirements Our signature scheme consists of a committer, a signer, and a verifier. The committer commits to a value and the signer then signs the committed value. Any one can verify the correctness of the signature. The committer can prove to the verifier that he knows the committed value embedded in the signature. Definition. Our signature scheme is a 6-tuple of polynomial-time algorithms (KeyGen, Commit, Sign, Verify, Prove, PVerify), where KeyGen( l ) is a probabilistic algorithm that takes as input the security parameter l and outputs a pair of keys (SK, VK) and param0. SK is the user s signing key, which is kept secret, and VK the user s verification key, which is made public. Commit, a probabilistic algorithm, takes as input a message m from the associated message space M and a number a and outputs a commitment c. Sign, a probabilistic algorithm, takes as input the signer s secret key SK, param0, and the commitment c and outputs a signature s Sign SK,VK (c). Verify is a deterministic algorithm that takes as input the signed commitment c and the signer s public key VK and outputs true or. Prove is a probabilistic algorithm that takes as input s and c and outputs (PK, Proof) proving the knowledge of the committed m and c without revealing the committed values. PVerify is a deterministic algorithm that takes as input (PK, Proof) and outputs true or. Our anonymous multi-show credential scheme is based the proposed signature scheme and consists of an organization, a group of users, and a service provider. The organization acts as the signer who issues credentials to users for some service provided by the service provider. Definition 2. The proposed anonymous multi-show credential scheme is a 5-tuple of polynomial-time algorithms (KeyGen, CIssue, CVerify, CProve, CPVerify). KeyGen( l ). CIssue: The user uses Commit and the signer uses Sign. In the end of the process, the user obtains (c, s). CVerify. The user checks the validity of (c, s) using Verify. CProve. Using Prove, the user proves to the service provider about his knowledge on (m, a) and s on c and outputs (PK, Proof). CVerify. The service provider checks the correctness of (PK, proof) using PVerify. We define the security notion for our basic signature scheme only. It is easy to extend it to the anonymous multi-show credential Completeness property for the signature on commitment values is defined as follows. (SK, VK, param0) KeyGen( l ) (c, s) Sign(c, SK) Pr true Verify(c, s) (PK, Proof) Prove(c, s) =. true PVerify(PK, Proof) We require our schemes to meet the requirement of existentially unforgeable against the chosen message attacks. We split it into to properties: Security of signature of commitment and security of proving knowledge of committed message in a signature. Assume there exists a TTP adversary A who launches a chosen message attack against our signature scheme and at most asks n queries to the signing oracle. [ Pr true Verify(c, s ) (c, s ) A(c i, VK, param0, i =,, n) ] = ɛ. Here, ɛ is negligible. For security of proving knowledge of committed message in a signature, we also require statistical zero knowledge; that is, it is negligible for an adversary A to obtain any information on m. Pr [ A knowsm true Verify(PK(m), Proof) ] = ɛ. 3 Preliminaries 3. Bilinear Pairings In recent years, the bilinear pairings have been widely applied to cryptography and enable us to construct some new cryptographic primitives. We briefly review the necessary facts about bilinear pairings using the same notation as [2, 4, 5]: Let G, G 2 be (multiplicative) cyclic groups of prime order p. Let g be a generator of G and g 2 be a generator of G 2. Let ψ is a computable isomorphism from G 2 to G, with ψ(g 2 ) = g.
3 International Journal of Network Security, Vol.7, No., PP.0 06, July Definition 3. A map e : G G 2 G T (here G T is another multiplicative cyclic group such that G = G 2 = G T = p) is called a bilinear pairing if this map satisfies the following properties: ) Bilinearity: for all u G, v G 2 and a, b Z p, we have e(u a, v b ) = e(u, v) ab. 2) Non-degeneracy: e(g, g 2 ). In other words, if g be a generator of G and g 2 be a generator of G 2, then e(g, g 2 ) generates G T. 3) Computability: There is an efficient algorithm to compute e(u, v) for all u G and v G 2. We say that (G, G 2 ) are bilinear groups if there exists a group G T, a computable isomorphism ψ : G 2 G, and a bilinear pairing e : G G 2 G T as above. In this paper, we assume that G G 2. In this case, the co-decision Diffie-Hellman problem (co-ddh) in (G, G 2 ) is easy, but we can still assume that the Decision Diffie-Hellman problem (DDH) in G is hard. The following Strong Diffie-Hellman assumption is suggested by [2, 3, 6]. [2] also provides a lower bound on the computational complexity in a generic group model. Definition 4. (q-sdh problem) The q-strong Diffie- Hellman problem in (G, G 2 ) is defined as follows: given a (q + 2)-tuple (g, g 2, g 2 γ,, g 2 γ q ) as input, outputs a pair (g /γ+x, x) where x Z p. An algorithm A has advantage ɛ in solving q-sdh in (G, G 2 ) if Pr[A(g, g 2, g 2 γ,, g 2 γ q ) = (g /γ+x, x)] ɛ, where the probability is over the random choice of generator in g 2 G 2, of γ Z p, and of the random bits of A. We say that the (q, t, ɛ)-sdh assumption holds in (G, G 2 ) if no t-time algorithm has advantage at least ɛ in solving the q-sdh problem in (G, G 2 ). 3.2 Proofs of Knowledge of Discrete Logarithms We will use the notation introduced by Camenisch and Stadler [0] for various proofs of knowledge of discrete logarithms. For instance, PK{(α, β, γ) : y = g α h β z = g α h γ (a α b)} is used for proving the knowledge of integers α, β and γ such that y = g α h β and z = g α h γ holds, where a α b. Here y, g, h, z, g and h are elements of some groups G =< g >=< h > and G T =< g >=< h >. 3.3 Pedersen Commitment Scheme Recall the Pedersen commitment scheme [4]: given a group G of prime order p with generators g and h, a commitment to x Z p is formed by choosing a random r Z p and setting the commitment C = g x h r. This commitment scheme is information-theoretically hiding, and is binding under the discrete logarithm assumption. 4 A Variant of BB04 Signature Scheme We describe the new signature scheme as follows. Let e : G G 2 G T be the bilinear pairing where G = G 2 = G T = p for some prime p. We assume that p 60. As for the message space, if the signature scheme is intended to be used directly for signing messages, then m = 60 is good enough, because, given a suitable collision resistant hash function, such as SHA-, one can first hash a message to 60 bits, and then sign the resulting value. So the messages m to be signed can be regarded as an element in Z p. We also need a very efficient and suitable conversion function from G to Z p: [ ] : G Z p. The system parameter is (G, G 2, G T, e, p, g, h, g 2, [ ]), here g, h G, g 2 G 2 are random generators. Key Generation. Randomly select x, y R Z p, and compute u = g2, x v = g y 2. The public key is u, v. The secret key is x, y. Signing: Given the secret key x, y R message m Z p, compute the signature σ = (g m x+[g ) m]+yr G. Z p, and a Here r is randomly selected from Z p. The signature is (r, σ). Verification: Verify that e(σ, ug [gm ] 2 v r ) = e(g m, g 2 ). We now give the security theorems and proofs for the above instantiation. Lemma. If there exists a (t, q S, ɛ)-forger F using adaptive chosen message attack for the proposed signature scheme, then there exists a (t, q S, ɛ)-forger F for BB04 Proof. Recall that BB04 signature scheme is described as follows. The system parameter is same as the above Key Generation. Randomly select x, y R Z p, and compute u = g2, x v = g y 2. The public key is u, v. The secret key is x, y. Signing: Given the secret key x, y R message m Z p, compute the signature The signature is (r, σ). x+m+yr σ = g G. Z p, and a Verification: Verify that e(σ, ug m 2 v r ) = e(g, g 2 ).
4 International Journal of Network Security, Vol.7, No., PP.0 06, July Suppose that there exists a (t, q S, ɛ)-forger F using adaptive chosen message attack for the proposed signature scheme, i.e., after at most q S signatures queries and t processing time, F outputs a valid signature forgery (r, σ) on message m with probability at least ɛ, here e(σ, ug [gm ] 2 v r ) = e(g m, g 2 ). Let m = [g m ], σ = σ m, then we have a forgery on BBS04 This is because of e(σ, ug m 2 vr ) = e(σ m, ug [gm ] 2 v r ) = e(g, g 2 ). Theorem ([2]). Suppose the (q, t, ɛ )-SDH assumption holds in G. Then BBS04 signature scheme is (t, q S, ɛ)- secure against existential forgery under an adaptive chosen message attack provided that q S < q, ɛ 2(ɛ + q S p ) 2ɛ, t t Θ(q 2 T), where T is the maximum time for an exponentiation in (G, G 2 ). So, we have the following theorem: Theorem 2. The proposed signature scheme is secure against existential forgery under an adaptive chosen message attack if the (q, t, ɛ )-SDH assumption holds in (G, G 2 ). 5 Obtaining a Signature on a Committed Value Following Camenisch and Lysyanskaya, in order to construct an anonymous credential system, it is sufficient to exhibit a signature on a committed value. We provide a new signature on a committed value based on the variant of BB04 signature scheme in this section. The system parameter is (G, G 2, G T, e, p, g, h, g 2, [ ]), here g, h G, g 2 G 2 are random generators. KeyGen. Randomly select x, y R Z p, and compute u = g2, x v = g y 2. The public key is u, v. The secret key is x, y. Commit: Compute c = g m h a. Sign: Given the secret key x, y R Z p, and a commitment c G, compute the signature as follows: Randomly select r R Z p, compute σ = c x+[c]+ry G. The signature one c = g m ha is (r, σ). Verify: Verify that e(σ, ug [c] 2 vr ) = e(c, g 2 ). Prove: The following protocol is a zero-knowledge proof of knowledge of a signed message for above signature Common input. The system parameter is (G, G 2, G T, e, p, g, h, g 2, [ ]), and the public key (u, v). Prover s input. The committed message m and a, and signature (r, σ). Protocol. The prover does the following: ) Compute a blinded version of his signature (r, σ): Randomly select r, r 2 R Z p, and compute c = (ug [c] 2 vr ) r = u r g r[c] 2 v rr, σ = σ r2. Send (c, σ ) to the verifier. 2) PVerify. The prover and verifier compute the following values: A = e(σ, c ), B = e(g, g 2 ), C = e(h, g 2 ) and then carry out the following zero-knowledge proof protocols: ZKP {(α, β, λ, λ 2, λ 3 ) A = B α C β c = u λ g λ2 2 vλ3 λ 0}. Here α = mr r 2, β = ar r 2, λ = r, λ 2 = r [c], λ 3 = rr. blind the credential by using two randomly generate numbers r, r 2. The completeness of the proposed signature scheme on a committed value is obvious. Due to the using of two randomly generate numbers r, r 2, the protocol can provide the anonymity. The protocol above uses zero-knowledge proof, so, it is a zero-knowledge proof of a signature on a value. 6 A Multi-show Anonymous Credential Scheme Based on the proposed signature scheme, we can now construct the multi-show anonymous credential We will follow the notations given previously in this paper. The system parameter is same as above signature KeyGen( l ): Generate public (u, v) and private signing key (x, y). CIssue: The user commits to (m, a) by computing c = g m h a. and the signer computes the signature on c: (r, σ = c x+[c]+ry ). CVerify. The user checks e(σ, ug [c] 2 vr )? = e(c, g 2 ). CProve. Using Prove, the user proves to the service provider about his knowledge on (m, a) and (r, σ) on
5 International Journal of Network Security, Vol.7, No., PP.0 06, July c and outputs (PK, Proof). Here, the (Proof) is the zero-knowledge proof: ZKP {(α, β, λ, λ 2, λ 3 ) A = B α C β c = u λ g λ2 2 vλ3 λ 0}. CVerify. The service provider checks the correctness of (PK, Proof) using PVerify. Our credential scheme is of multi-show, i.e., the user can blind the credential by using two randomly generate numbers r, r 2. The credential itself is never sent to the service provider in clear. Clearly, our scheme also supports non-transferability. To show a credential to the service provider, the user has to know his secret (m, a). Of course, we have to assume that his secret should not be given to others. However, it is also not hard for us to modify the scheme such that there exists a revocation manager who can revoke the identity of the user if needed. 7 Conclusion In this paper, we propose a variant of Boneh-Boyen short signature scheme without random oracle such that it can be used as a building block for cryptographic protocols. We provide a protocol to prove knowledge of a signature on a committed message and to obtain a signature on a committed message such that it can be converted into an efficient multi-show credential The proposed signature scheme on a committed value in this paper has many good properties, and for the further work, we expect to design a group signature scheme based on this signature Acknowledgements This work is supported by the National Natural Science Foundation of China (No , No and No ), Natural Science Foundation of Guangdong Province, China (No ), 973 Program (2006CB30304) and ARC Discovery Grant DP References [] E. Bangerter, J. Camenisch, and A. Lysyanskaya, A cryptographc framework for the controlled release of certified data, in Twelfth International Workshop on Security Protocols, LNCS 3957, pp , Springer-Verlag, [2] D. Boneh, and X. Boyen, Short signatures without random Oracles, in Advances in Cryptology (Eurocrypt 04), LNCS 3027, pp , Springer-Verlag, [3] D. Boneh, X. Boyen, and H. Shacham, Short group signatures using strong diffie hellman, in Advances in Cryptology (Crypto 04), LNCS 352, pp. 4-55, Springer-Verlag, [4] D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, in Advances in Cryptology (Crypto 0), LNCS 239, pp , Springer- Verlag, 200. [5] D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, in Advances in Cryptology (Asiacrypt 0), LNCS 2248, pp , Springer-Verlag, 200. [6] S. Brands, Rethinking Public Key Infrastructures and Digital Certificates; Bulding in Privacy, MIT Press, [7] J. Camenisch and A. Lysyanskaya, Efficient nontransferable anonymous multishow credential system with optional anonymity revocation, in Advances in Cryptology (Eurocrypt 0), LNCS 2045, pp. 93-8, Springer-Verlag, 200. [8] J. Camenisch and A. Lysyanskaya, A signature scheme with efficient protocols, in Security in Communication Networks (SCN 02), LNCS 2576, pp , Springer-Verlag, [9] J. Camenisch and A. Lysyanskaya, Signature schemes and anonymous credentials from bilinear maps, in Advances in Cryptology (Crypto 04), LNCS 352, pp , Springer-Verlag, [0] J. Camenisch and M. Michels, Efficient group signature schemes for large group, in Advances in Cryptology (Crypto 97), LNCS 296, pp , Springer-Verlag, 997. [] D. Chaum, Security without identification: transacation systems to make big brother obsolete, Communications of ACM, vol. 28, no. 0, pp , Oct [2] A. Joux, A one round protocol for tripartite Diffie- Hellman, in 4th International Symposium on Algorithmic Number Theory (ANTS IV), LNCS 838, pp , Springer-Verlag, [3] S. Mitsunari, R. Sakai, and M. Kasahara, A new traitor tracing, IEICE Transactions on Fundamentals, vol. E85-A, no. 2, pp , [4] T. P. Pedersen, Non-interactive and informationtheoretic secure verifiable secret sharing, in Advances in Cryptology (Crypto 9), LNCS 576, pp Springer-Verlag, 992. [5] E. Verheul, Self-blindable credential certificates from the Weil pairing, in Advances in Cryptology (Asiacrypt 0), LNCS 2248, pp , Springer- Verlag, 200. [6] F. Zhang, R. S. Naini, and W. Susilo, An efficient signature scheme from bilinear pairings and its applications, in Public Key Cryptography (PKC 04), LNCS 2947, pp , Springer-Verlag, Singapore, 2004.
6 International Journal of Network Security, Vol.7, No., PP.0 06, July Fangguo Zhang is a Professor in the Yi Mu received his PhD from Department of Electronics and Comthe Australian National University in munication Engineering at Sun Yan994. He was a lecturer in the School sen University in Guangzhou, China. of Computing and IT at the University He obtained his Ph.D. degree in Crypof Western Sydney and a senior lectography from School of Communiturer in the Department of Computing cation Engineering, Xidian University at Macquarie University. He currently in 200. His main research interests is an associate professor in the Inforinclude elliptic curve cryptography, pairing-based cryp- mation Technology and Computer Science, University of tosystem and its applications. Wollongong. His current research interests include network security, computer security, and cryptography. Yi Xiaofeng Chen is an Associate Pro- Mu has published more than 40 research papers in interfessor in the Department of Computer national conferences and journals. He has served in techscience at Sun Yan-sen University, nical program committees of a number of international Guangzhou, China. He obtained his conferences and the editorial boards of six international Ph.D. degree in Cryptography from journals. He is a senior member of the IEEE, and a memschool of Communication Engineer- ber of the IACR. ing, Xidian University in His main research interests include public Willy Susilo received a Ph.D. in key cryptography and E-commerce security. Computer Science from University of Wollongong, Australia. He is currently an Associate Professor at the School of Information Technology and Computer Science of the University of Wollongong. He is the coordinator of Network Security Research Laboratory at the University of Wollongong. His research interests include cryptography, information security, computer security and network security. His main contribution is in the area of digital signature schemes, in particular failstop signature schemes and short signature schemes. He has served as a program committee member in a number of international conferences. He has published numerous publications in the area of digital signature schemes and encryption schemes.
Efficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
New Efficient Searchable Encryption Schemes from Bilinear Pairings
International Journal of Network Security, Vol.10, No.1, PP.25 31, Jan. 2010 25 New Efficient Searchable Encryption Schemes from Bilinear Pairings Chunxiang Gu and Yuefei Zhu (Corresponding author: Chunxiang
An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings
Theoretical and Applied Informatics ISSN 896 5334 Vol.24 (202), no. 2 pp. 09 8 DOI: 0.2478/v079-02-0009-0 An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings
Lecture 25: Pairing-Based Cryptography
6.897 Special Topics in Cryptography Instructors: Ran Canetti and Ron Rivest May 5, 2004 Lecture 25: Pairing-Based Cryptography Scribe: Ben Adida 1 Introduction The field of Pairing-Based Cryptography
Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation
Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation 1 Agenda EPID overview EPID usages Device Authentication Government Issued ID EPID performance and standardization efforts 2
Privacy-Providing Signatures and Their Applications. PhD Thesis. Author: Somayeh Heidarvand. Advisor: Jorge L. Villar
Privacy-Providing Signatures and Their Applications PhD Thesis Author: Somayeh Heidarvand Advisor: Jorge L. Villar Privacy-Providing Signatures and Their Applications by Somayeh Heidarvand In fulfillment
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings Ernie Brickell Intel Corporation [email protected] Liqun Chen HP Laboratories [email protected] March
Identity-Based Encryption from the Weil Pairing
Appears in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages
MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC
MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC by Brittanney Jaclyn Amento A Thesis Submitted to the Faculty of The Charles E. Schmidt College of Science in Partial
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings Fangguo Zhang 1, Reihaneh Safavi-Naini 1 and Chih-Yin Lin 2 1 School of Information Technology and Computer
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction
International Journal of Network Security, Vol.16, No.3, PP.174-181, May 2014 174 CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction Min Zhou 1, Mingwu Zhang 2, Chunzhi
Short Group Signatures
An extended abstract of this paper is to appear in Advances in Cryptology CRYPTO 2004, Springer-Verlag. Short Group Signatures Dan Boneh [email protected] Xavier Boyen [email protected] Hovav Shacham [email protected]
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Comments on "public integrity auditing for dynamic data sharing with multi-user modification"
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic
Security in Electronic Payment Systems
Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood One significant impediment to the widespread adoption of public-key cryptography is its dependence on a public-key infrastructure
Security Arguments for Digital Signatures and Blind Signatures
Journal of Cryptology, Volume 13, Number 3. Pages 361 396, Springer-Verlag, 2000. 2000 International Association for Cryptologic Research Security Arguments for Digital Signatures and Blind Signatures
Certificate Based Signature Schemes without Pairings or Random Oracles
Certificate Based Signature Schemes without Pairings or Random Oracles p. 1/2 Certificate Based Signature Schemes without Pairings or Random Oracles Joseph K. Liu, Joonsang Baek, Willy Susilo and Jianying
1 Digital Signatures. 1.1 The RSA Function: The eth Power Map on Z n. Crypto: Primitives and Protocols Lecture 6.
1 Digital Signatures A digital signature is a fundamental cryptographic primitive, technologically equivalent to a handwritten signature. In many applications, digital signatures are used as building blocks
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
Efficient Protocols for Set Membership and Range Proofs
Efficient Protocols for Set Membership and Range Proofs Jan Camenisch 1, Rafik Chaabouni 1,2, and abhi shelat 3 1 IBM Research 2 EPFL 3 U. of Virginia Abstract. We consider the following problem: Given
MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
Digital Signatures. (Note that authentication of sender is also achieved by MACs.) Scan your handwritten signature and append it to the document?
Cryptography Digital Signatures Professor: Marius Zimand Digital signatures are meant to realize authentication of the sender nonrepudiation (Note that authentication of sender is also achieved by MACs.)
A New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10
with Embedding Degree 10 University of California, Berkeley, USA ANTS-VII, 2006 Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3 Outline 1 Introduction
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
Improved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
Digital Signatures. What are Signature Schemes?
Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public
Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella
Signature Schemes CSG 252 Fall 2006 Riccardo Pucella Signatures Signatures in real life have a number of properties They specify the person responsible for a document E.g. that it has been produced by
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
A blind digital signature scheme using elliptic curve digital signature algorithm
A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Group Blind Digital Signatures: Theory and Applications by Zulækar Amin Ramzan Submitted to the Department of Electrical Engineering and Computer Science in partial fulællment of the requirements for the
Attribute-proving for Smart Cards
Attribute-proving for Smart Cards progress made over the past two years ir. Pim Vullers [email protected] Institute for Computing and Information Sciences Digital Security 5th October 2011 Pim Vullers
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Implementation and Adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication
Implementation and Adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication Stefan Kaufmann IT-Designers Gruppe STZ-Softwaretechnik Im Entennest 2 73730 Esslingen [email protected]
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science [email protected] Abstract Self-Certified
Practical Forward Secure Group Signature Schemes
Practical Forward Secure Group Signature Schemes Dawn Xiaodong Song University of California, Berkeley [email protected] ABSTRACT A group signature scheme allows a group member to sign messages
Security Analysis of DRBG Using HMAC in NIST SP 800-90
Security Analysis of DRBG Using MAC in NIST SP 800-90 Shoichi irose Graduate School of Engineering, University of Fukui hrs [email protected] Abstract. MAC DRBG is a deterministic random bit generator
DEVELOPMENT OF CERTIFICATE LESS DIGITAL SIGNATURE SCHEME & ITS APPLICATION IN E-CASH SYSTEM
DEVELOPMENT OF CERTIFICATE LESS DIGITAL SIGNATURE SCHEME & ITS APPLICATION IN E-CASH SYSTEM A Thesis is submitted in partial fulfilment of the requirements for the degree of Bachelor of Technology In Computer
A Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
Schnorr Blind Signatures and Insights From a Computer Network Marketing Model
On the Security of One-Witness Blind Signature Schemes Foteini Baldimtsi and Anna Lysyanskaya foteini,[email protected] Computer Science Department, Brown University Abstract. Blind signatures have proved
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. [email protected] Dr.S.Rajalakshmi, Associate Professor/CSE,
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Chosen-Ciphertext Security from Identity-Based Encryption
Chosen-Ciphertext Security from Identity-Based Encryption Dan Boneh Ran Canetti Shai Halevi Jonathan Katz Abstract We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes
Identity Based Encryption. Terence Spies VP Engineering [email protected]
Identity Based Encryption Terence Spies VP Engineering [email protected] Voltage Security Overview Breakthrough technology for encryption and access control Based on work of Dr. Boneh at Stanford and
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems
The 28th International Conference on Distributed Computing Systems Workshops A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems Zhong Xu Xue Liu School of Computer Science McGill
1 Signatures vs. MACs
CS 120/ E-177: Introduction to Cryptography Salil Vadhan and Alon Rosen Nov. 22, 2006 Lecture Notes 17: Digital Signatures Recommended Reading. Katz-Lindell 10 1 Signatures vs. MACs Digital signatures
Privacy in e-ticketing & e-identity
Privacy in e-ticketing & e-identity Attribute-proving for Smart Cards ir. Pim Vullers [email protected] Institute for Computing and Information Sciences Digital Security 17th May 2011 Pim Vullers Collis
Paillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
Introduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 30 Digital Signatures CS 355 Fall 2005 / Lecture 30 1 Announcements Wednesday s lecture cancelled Friday will be guest lecture by Prof. Cristina Nita- Rotaru
Lecture 15 - Digital Signatures
Lecture 15 - Digital Signatures Boaz Barak March 29, 2010 Reading KL Book Chapter 12. Review Trapdoor permutations - easy to compute, hard to invert, easy to invert with trapdoor. RSA and Rabin signatures.
Digital Signature. Raj Jain. Washington University in St. Louis
Digital Signature Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
An Approach to Shorten Digital Signature Length
Computer Science Journal of Moldova, vol.14, no.342, 2006 An Approach to Shorten Digital Signature Length Nikolay A. Moldovyan Abstract A new method is proposed to design short signature schemes based
Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem
Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies
Lecture 17: Re-encryption
600.641 Special Topics in Theoretical Cryptography April 2, 2007 Instructor: Susan Hohenberger Lecture 17: Re-encryption Scribe: Zachary Scott Today s lecture was given by Matt Green. 1 Motivation Proxy
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
A Strong RSA-based and Certificateless-based Signature Scheme
International Journal of Network Security, Vol.18, No.2, PP.201-208, Mar. 2016 201 A Strong RSA-based and Certificateless-based Signature Scheme Chin-Chen Chang 1,2, Chin-Yu Sun 3, and Shih-Chang Chang
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
A New, Publicly Veriable, Secret Sharing Scheme
Scientia Iranica, Vol. 15, No. 2, pp 246{251 c Sharif University of Technology, April 2008 A New, Publicly Veriable, Secret Sharing Scheme A. Behnad 1 and T. Eghlidos A Publicly Veriable Secret Sharing
An Internet Based Anonymous Electronic Cash System
Research Paper American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-4, Issue-4, pp-148-152 www.ajer.org Open Access An Internet Based Anonymous Electronic Cash System
A novel deniable authentication protocol using generalized ElGamal signature scheme
Information Sciences 177 (2007) 1376 1381 www.elsevier.com/locate/ins A novel deniable authentication protocol using generalized ElGamal signature scheme Wei-Bin Lee a, Chia-Chun Wu a, Woei-Jiunn Tsaur
