Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/648120.747061guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme

Published: 06 January 2003 Publication History

Abstract

We propose a robust proactive threshold signature scheme, a multisignature scheme and a blind signature scheme which work in any Gap Diffie-Hellman (GDH) group (where the Computational Diffie-Hellman problem is hard but the Decisional Diffie-Hellman problem is easy). Our constructions are based on the recently proposed GDH signature scheme of Boneh et al. [8]. Due to the instrumental structure of GDH groups and of the base scheme, it turns out that most of our constructions are simpler, more efficient and have more useful properties than similar existing constructions. We support all the proposed schemes with proofs under the appropriate computational assumptions, using the corresponding notions of security.

References

[1]
M. BELLARE AND P. ROGAWAY, Random oracles are practical: a paradigm for designing efficient protocols. First ACM Conference on Computer and Communications Security , ACM, 1993.
[2]
M. BELLARE, C. NAMPREMPRE, D. POINTCHEVAL AND M. SEMANKO, "The One-More-RSA-Inversion Problems and the security of Chaum's Blind Signature Scheme," Financial Cryptography 01, Lecture Notes in Computer Science , 2001.
[3]
M. BELLARE, J. GARAY AND T. RABIN, "Fast batch verification for modular exponentiation and digital signatures," Eurocrypt 98 , 1998.
[4]
E. BERLEKAMP AND L. WELCH, "Error correction of algebraic block codes," US Patent 4, 633, 470 .
[5]
A. BOLDYREVA "Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme," Full version of this paper. Available at http://www-cse.ucsd.edu/users/aboldyre/.
[6]
D. BONEH AND M. FRANKLIN. "Identity-based encryption from the Weil Pairing," Crypto 01 , 2001.
[7]
D. BONEH, C. GENTRY, B. LYNN AND H. SHACHAM, "Aggregate signatures from bilinear maps," Manuscript.
[8]
D. BONEH, B. LYNN AND H. SHACHAM, "Short signatures from theWeil pairing," Asiacrypt 01 , 2001.
[9]
C. BOYD, "Digital multisignatures," Cryptography and Coding , 1986.
[10]
J. CAMENISCH AND M. STADLER, "Efficient group signatures for large groups," Crypto 97 , 1997.
[11]
D. CHAUM, "Blind signatures for untreaceable payments," Crypto 82 , 1982.
[12]
D. CHAUM AND E. VAN HEYST, "Group signatures," Eurocrypt 91 , 1991.
[13]
R. CANETTI AND A. HERZBERG, "Maintaining security in the presence of transient faults," Crypto 94 , 1994.
[14]
Y. DESMEDT, "Society and group oriented cryptography," Crypto 87 , 1987.
[15]
Y. DESMEDT, "Threshold cryptography,", European Transactions on Telecommunications , 5(4), 1994.
[16]
Y. DESMEDT AND Y. FRANKEL, "Threshold cryptosystems," Crypto 89 , 1989.
[17]
Y. DESMEDT AND Y. FRANKEL, "Shared generation of authenticators and signatures," Crypto 91 , 1991.
[18]
P. FELDMAN "A practical scheme for non-interactive verifiable secret sharing," FOCS 87 , 1987.
[19]
Y. FRANKEL, P. GEMMAL, P. MACKENZIE AND M. YUNG, "Proactive RSA," Crypto 97 , 1997.
[20]
S. GALBRAITH, J. MALONE-LEE, N.P. SMART, "Public key signatures in the multi-user setting", Information Processing Letters , Vol. 83, Issue 5, 2002.
[21]
R. GENNARO, S. JARECKI, H. KRAWCZYK AND T. RABIN, "Robust threshold DSS signatures," Eurocrypt 96 , 1996.
[22]
R. GENNARO, S. JARECKI, H. KRAWCZYK AND T. RABIN, "Secure distributed key generation for discrete-log based cryptosystems", Eurocrypt 99 , 1999.
[23]
S. GOLDWASSER, S. MICALI AND R. RIVEST, "A digital signature secure against adaptive chosen-message attacks", SIAM Journal on Computing , 17(2):281-308, 1988.
[24]
L. HARN, "Group-oriented (t,n) threshold digital signature scheme and digital multisignature," IEE Proc. Computers and Digital Techniques , 141(5), 1994.
[25]
A. HERZBERG, M. JAKOBSSON, S. JARECKI, H. KRAWCZYK AND M. YUNG, "Proactive public key and signature systems," ACM Conference on Computers and Communication Security , 1997. 22:612-613, (1979).
[26]
A. HERZBERG, S. JARECKI, H. KRAWCZYK AND M. YUNG, "Proactive secret sharing, or: How to cope with perpetual leakage,", Crypto 95 , 1995.
[27]
P. HORSTER, M. MICHELS AND H. PETERSEN, "Meta-multisignatures schemes based on the discrete logarithm problem," IFIP/Sec 1995.
[28]
K. ITAKURA AND K. NAKAMURA, "A public key cryptosystem suitable for digital multisignatures," NEC Research & Development , 71:1-8, 1983.
[29]
A. JOUX, "A one-round protocol for tripartite Diffie-Hellman," ANTS-IV conference, vol. 1838 .
[30]
A. JOUX AND K. NGUYEN, "Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups," e-print archive, report #2001/03 .
[31]
C. LI, T. HWANG AND N. LEE, "Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders," Eurocrypt 94 , 1994.
[32]
A. LYSYANSKAYA, "Unique signatures and verifiable random functions from the DH-DDH separation", Crypto 02 , 2002.
[33]
S. MICALI, K. OHTA AND L. REYZIN, "Accountable-subgroup multisignatures," ACM Conference on Computer and Communications Security , 2001.
[34]
T. OKAMOTO, "A digital multi-signature schema using bijective public-key cryptosystems," ACM Transaction on Computer Systems , 6(4): 432-441, 1988.
[35]
K. OHTA AND T. OKAMOTO, "A digital multi-signature scheme based on the Fiat-Shamir scheme", Asiacrypt 91 , 1991.
[36]
K. OHTA AND T. OKAMOTO, "Multi-signature scheme secure against active insider attacks", IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences , E82-A(1):21-31, 1999.
[37]
R. OSTROVSKY AND M. YUNG, "How to withstand mobile virus attacks," PODC , 1991.
[38]
T. PEDERSEN, "Non-interactive and information-theoretic secure verifiable secret sharing," Eurocrypt 91 , 1991.
[39]
D. POINTCHEVAL AND J. STERN, "Provably secure blind signature schemes," Asiacrypt 96 , 1996.
[40]
D. POINTCHEVAL AND J. STERN, "Security arguments for digital signatures and blind signatures," Journal of Cryptology , 13(3):361-396, 2000.
[41]
T. RABIN, "A simplified approach to threshold and proactive RSA," Crypto 98 , 1998.
[42]
R. RIVEST, A. SHAMIR AND Y. TAUMAN, "How to leak a secret", Asiacrypt 01 , 2001.
[43]
A. SHAMIR, "How to share a secret," Communications of the ACM , 22:612-613, (1979).
[44]
V. SHOUP, "Practical threshold signatures", Eurocrypt 00 , 2000.

Cited By

View all
  • (2023)Practical asynchronous high-threshold distributed key generation and distributed polynomial samplingProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620537(5359-5376)Online publication date: 9-Aug-2023
  • (2023)CryptoConcurrency: (Almost) Consensusless Asset Transfer with Shared AccountsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616587(1556-1570)Online publication date: 15-Nov-2023
  • (2021)BasilProceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles10.1145/3477132.3483552(1-17)Online publication date: 26-Oct-2021
  • Show More Cited By

Index Terms

  1. Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        PKC '03: Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
        January 2003
        366 pages
        ISBN:354000324X

        Publisher

        Springer-Verlag

        Berlin, Heidelberg

        Publication History

        Published: 06 January 2003

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 22 Sep 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Practical asynchronous high-threshold distributed key generation and distributed polynomial samplingProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620537(5359-5376)Online publication date: 9-Aug-2023
        • (2023)CryptoConcurrency: (Almost) Consensusless Asset Transfer with Shared AccountsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616587(1556-1570)Online publication date: 15-Nov-2023
        • (2021)BasilProceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles10.1145/3477132.3483552(1-17)Online publication date: 26-Oct-2021
        • (2020)CALYPSOProceedings of the VLDB Endowment10.14778/3436905.343691714:4(586-599)Online publication date: 1-Dec-2020
        • (2019)A Tightly-Secure Lattice-Based MultisignatureProceedings of the 6th on ASIA Public-Key Cryptography Workshop10.1145/3327958.3329542(3-11)Online publication date: 2-Jul-2019
        • (2019)Practical Aggregate Signature from General Elliptic Curves, and Applications to BlockchainProceedings of the 2019 ACM Asia Conference on Computer and Communications Security10.1145/3321705.3329826(529-538)Online publication date: 2-Jul-2019
        • (2019)SoKProceedings of the 1st ACM Conference on Advances in Financial Technologies10.1145/3318041.3355457(41-61)Online publication date: 21-Oct-2019
        • (2019)Key-homomorphic signaturesDesigns, Codes and Cryptography10.1007/s10623-018-0535-987:6(1373-1413)Online publication date: 1-Jun-2019
        • (2018)Scalable practical byzantine fault tolerance with short-lived signature schemesProceedings of the 28th Annual International Conference on Computer Science and Software Engineering10.5555/3291291.3291316(245-256)Online publication date: 29-Oct-2018
        • (2018)Verifiable threshold quantum secret sharing with sequential communicationQuantum Information Processing10.5555/3281943.328799317:11(1-13)Online publication date: 1-Nov-2018
        • Show More Cited By

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media