Delegatable Functional Signatures
نویسندگان
چکیده
We introduce delegatable functional signatures (DFS) which support the delegation of signingcapabilities to another party, called the evaluator, with respect to a functionality F . In a DFS,the signer of a message can choose an evaluator, specify how the evaluator can modify thesignature without voiding its validity, allow additional input and decide how the evaluator canfurther delegate its capabilities.The main contribution of this paper is twofold. First, we propose DFS, a novel cryptographicprimitive that unifies several seemingly different signature primitives, including functional sig-natures as defined by Boyle, Goldwasser, and Ivan (eprint 2013/401), sanitizable signatures,identity based signatures, and blind signatures. To achieve this unification, we present severaldefinitions of unforgeability and privacy. Finding appropriate and meaningful definitions in thiscontext is challenging due to the natural mealleability of DFS and due to the multi-party settingthat may involve malicious keys.Second, we present a complete characterization of the instantiability of DFS under commonassumptions, like the existence of one-way functions. Here, we present both positive and negativeresults. On the positive side we show that DFS not achieving our notion of privacy can beconstructed from one-way functions. Furthermore, we show that unforgerable and private DFScan be constructed from doubly enhanced trapdoor permutations. On the negative side weshow that the previous result is optimal regarding its underlying assumptions presenting animpossibility result for unforgeable private DFS from one-way permutations.
منابع مشابه
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials
A signature scheme is malleable if, on input a message m and a signature σ, it is possible toefficiently compute a signature σ′ on a related message m′ = T (m), for a transformation T thatis allowable with respect to this signature scheme. Previous work considered various useful flavorsof allowable transformations, such as quoting and sanitizing messages. In this paper, we explore a...
متن کاملA Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings
Up to now, several non-delegatable identity-based (strong) designated verifier signature schemes using bilinear pairings are proposed. In these identity-based (strong) designated verifier signature schemes, bilinear pairings are employed either in signing and verifying steps or only in the verifying step. However, the computation cost of pairings at a security level equivalent to a 128-bit symm...
متن کاملAn efficient non-delegatable identity based strong designated verifier signature scheme
Designated verifier signatures are intended to a specific and unique designated verifier, who is the only one person to check their validity. This paper proposes a new efficient non-delegatable strong designated verifier signature scheme based on identity based cryptography. We analyze the security of the scheme and compare its computational aspects with the other ID-SDVS schemes existing in li...
متن کاملHighly Controlled, Fine-grained Delegation of Signing Capabilities
Delegation of signing rights is a central problem in security. Whereas delegating by givingpower of attorney is well studied and digitally realized via delegatable anonymous credentials,directly delegating signing possibilities without the need for an external logic, can be done viamalleable signature schemes. However, the existing schemes do not allow for privacy preserving,fin...
متن کاملCommuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials
Verifiable encryption allows to encrypt a signature and prove that the plaintext is valid. We introduce a new primitive called commuting signature that extends verifiable encryption in multiple ways: a signer can encrypt both signature and message and prove validity; more importantly, given a ciphertext, a signer can create a verifiably encrypted signature on the encrypted message; thus signing...
متن کامل