Two-Round Concurrent Blind Signatures without Random Oracles
نویسندگان
چکیده
We present the first blind signature scheme that is efficient and provably secure without random oracles under concurrent attacks utilizing only two rounds of short communication. The scheme is based on elliptic curve groups for which a bilinear map exists and on extractable and equivocable commitments. The unforgeability of the employed signature scheme is guarranteed by the LRSW assumption while the blindness property of our scheme is guarranteed by the Decisional Linear Diffie Hellman assumption. We prove our construction secure under the above assumptions as well as the DCR and DLOG assumptions in the concurrent attack model of Juels, Luby and Ostrovsky from Crypto ’97. Our construction is the first scheme that instantiates the security definition of Juels et al. with an efficient construction in the standard model. We consider various modifications to our basic protocol that inlude a blind signature scheme with revokable blindness as well as a blind signature that incorporates a “public-tagging” mechanism. The latter extension of our scheme gives rise to a partially blind signature with the same efficiency and security properties as our basic scheme. ∗University of Connecticut, Computer Science and Engineering, Storrs, CT, USA, {aggelos,hszhou}@cse.uconn.edu. Research partly supported by NSF CAREER Award CNS-0447808.
منابع مشابه
Concurrent Blind Signatures Without Random Oracles
We present a blind signature scheme that is efficient and provably secure without random oracles under concurrent attacks utilizing only four moves of short communication. The scheme is based on elliptic curve groups for which a bilinear map exists and on extractable and equivocable commitments. The unforgeability of the employed signature scheme is guaranteed by the LRSW assumption while the b...
متن کاملFormalizing Group Blind Signatures and Practical Constructions without Random Oracles
Group blind signatures combine anonymity properties of both group signatures and blind signatures and offer privacy for both the message to be signed and the signer. Their applications include multi-authority e-voting and distributed e-cash systems. The primitive has been introduced with only informal definitions for its required security properties. We offer two main contributions: first, we p...
متن کاملRound Optimal Blind Signatures
Constructing round-optimal blind signatures in the standard model has been a long standing open problem. In particular, Fischlin and Schröder recently ruled out a large class of three-move blind signatures in the standard model (Eurocrypt’10). In particular, their result shows that finding security proofs for the well-known blind signature schemes by Chaum, and by Pointcheval and Stern in the s...
متن کاملConcurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
We show a new protocol for blind signatures in which security is preserved even under arbitrarily-many concurrent executions. The protocol can be based on standard cryptographic assumptions and is the first to be proven secure in a concurrent setting (under any assumptions) without random oracles or a trusted setup assumption such as a common reference string. Along the way, we also introduce n...
متن کاملSub-linear Blind Ring Signatures without Random Oracles
Ring signatures allow a signer to anonymously sign a message on behalf of a set of arbitrarily chosen signers called a “ring”. Blind signatures, on the other hand, allow a user to obtain a signature on a message while maintaining the privacy of the message. Blind ring signatures combine properties of both primitives and hence provide a strong notion of anonymity where the privacy of both the id...
متن کامل