+ All Categories
Home > Documents > Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question...

Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question...

Date post: 09-Aug-2020
Category:
Upload: others
View: 4 times
Download: 0 times
Share this document with a friend
46
Motivation Research Question Results Conclusion Notes Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures Siamak Shahandashti 1 Rei Safavi-Naini 2 1 SCSSE & CCISR, Uni Wollongong, Australia www.uow.edu.au/sfs166 2 Dept Comp Sci & iCIS, Uni Calgary, Canada www.cpsc.ucalgary.ca/rei PKC 2008 UDVS & IBS from Signatures Universities of Wollongong and Calgary
Transcript
Page 1: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Construction of Universal Designated-VerifierSignatures and Identity-Based Signatures

from Standard Signatures

Siamak Shahandashti1 Rei Safavi-Naini2

1SCSSE & CCISR, Uni Wollongong, Australiawww.uow.edu.au/ ∼sfs166

2Dept Comp Sci & iCIS, Uni Calgary, Canadawww.cpsc.ucalgary.ca/ ∼rei

PKC 2008

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 2: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

OutlineMotivation

Universal Designated-Verifier SignaturesIdentity-Based Signatures

Research QuestionResearch QuestionFormulation of Patterns

ResultsOur UDVS Construction and Its SecurityOur IBS Construction and Its Security

ConclusionConcluding Remarks

NotesFinal Notes

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 3: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Universal Designated-Verifier Signatures

What’s a Universal Designated-Verifier Signature?a.k.a. UDVS

I Basically: a signature scheme with an extra functionalityI Goal: to protect user privacy when using credentialsI Idea: transform signature s.t. it only convinces a particular

verifier

Credential Issuer

DVer d

Credential Verifier

σ̂σ

Desig

pks, pkv,m, σ

σ̂

Credential Holderpks, skv,m, σ̂

Sign

sks,m

σ

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 4: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Universal Designated-Verifier Signatures

What’s a Universal Designated-Verifier Signature?a.k.a. UDVS

I Basically: a signature scheme with an extra functionalityI Goal: to protect user privacy when using credentialsI Idea: transform signature s.t. it only convinces a particular

verifier

Credential Issuer

DVer d

Credential Verifier

σ̂σ

Desig

pks, pkv,m, σ

σ̂

Credential Holderpks, skv,m, σ̂

Sign

sks,m

σ

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 5: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Universal Designated-Verifier Signatures

What’s a Universal Designated-Verifier Signature?a.k.a. UDVS

I Basically: a signature scheme with an extra functionalityI Goal: to protect user privacy when using credentialsI Idea: transform signature s.t. it only convinces a particular

verifier

Credential Issuer

DVer d

Credential Verifier

σ̂σ

Desig

pks, pkv,m, σ

σ̂

Credential Holderpks, skv,m, σ̂

Sign

sks,m

σ

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 6: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Universal Designated-Verifier Signatures

How can we construct a UDVS?

I σ̂ is a designated-verifier non-interactive proof of holding avalid signature on m.

I Jakobsson et al’s intuition to verifier designation: “Insteadof proving X, Alice will prove the statement: Either X istrue, or I am Bob.”

I In the Random Oracle Model, non-interactive proofs can beconstructed using Fiat-Shamir heuristic from Σ protocols.

I So the only things we need are:I A Σ protocol for proof of knowledge of a signature on a

message, andI A Σ protocol for proof of knowledge of the verifier’s secret

key.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 7: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Universal Designated-Verifier Signatures

How can we construct a UDVS?

I σ̂ is a designated-verifier non-interactive proof of holding avalid signature on m.

I Jakobsson et al’s intuition to verifier designation: “Insteadof proving X, Alice will prove the statement: Either X istrue, or I am Bob.”

I In the Random Oracle Model, non-interactive proofs can beconstructed using Fiat-Shamir heuristic from Σ protocols.

I So the only things we need are:I A Σ protocol for proof of knowledge of a signature on a

message, andI A Σ protocol for proof of knowledge of the verifier’s secret

key.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 8: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Universal Designated-Verifier Signatures

How can we construct a UDVS?

I σ̂ is a designated-verifier non-interactive proof of holding avalid signature on m.

I Jakobsson et al’s intuition to verifier designation: “Insteadof proving X, Alice will prove the statement: Either X istrue, or I am Bob.”

I In the Random Oracle Model, non-interactive proofs can beconstructed using Fiat-Shamir heuristic from Σ protocols.

I So the only things we need are:I A Σ protocol for proof of knowledge of a signature on a

message, andI A Σ protocol for proof of knowledge of the verifier’s secret

key.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 9: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Universal Designated-Verifier Signatures

How can we construct a UDVS?

I σ̂ is a designated-verifier non-interactive proof of holding avalid signature on m.

I Jakobsson et al’s intuition to verifier designation: “Insteadof proving X, Alice will prove the statement: Either X istrue, or I am Bob.”

I In the Random Oracle Model, non-interactive proofs can beconstructed using Fiat-Shamir heuristic from Σ protocols.

I So the only things we need are:I A Σ protocol for proof of knowledge of a signature on a

message, andI A Σ protocol for proof of knowledge of the verifier’s secret

key.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 10: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Identity-Based Signatures

How can we construct an Identity-Based Signature?a.k.a. IBS

Key Issuer

DVer d

Verifier

σusk

Desig

usk, m

σ

Usermpk, id,m, σ

UKeyGen

msk, id

usk

I σ is a signature on m that shows the signer has knowledgeof usk

I In the Random Oracle Model, signatures can beconstructed using Fiat-Shamir heuristic from Σ protocols.

I So again the only thing we need is:I A Σ protocol for proof of knowledge of a signature on a

message.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 11: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Identity-Based Signatures

How can we construct an Identity-Based Signature?a.k.a. IBS

Key Issuer

DVer d

Verifier

σusk

Desig

usk, m

σ

Usermpk, id,m, σ

UKeyGen

msk, id

usk

I σ is a signature on m that shows the signer has knowledgeof usk

I In the Random Oracle Model, signatures can beconstructed using Fiat-Shamir heuristic from Σ protocols.

I So again the only thing we need is:I A Σ protocol for proof of knowledge of a signature on a

message.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 12: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Identity-Based Signatures

How can we construct an Identity-Based Signature?a.k.a. IBS

Key Issuer

DVer d

Verifier

σusk

Desig

usk, m

σ

Usermpk, id,m, σ

UKeyGen

msk, id

usk

I σ is a signature on m that shows the signer has knowledgeof usk

I In the Random Oracle Model, signatures can beconstructed using Fiat-Shamir heuristic from Σ protocols.

I So again the only thing we need is:I A Σ protocol for proof of knowledge of a signature on a

message.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 13: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Identity-Based Signatures

How can we construct an Identity-Based Signature?a.k.a. IBS

Key Issuer

DVer d

Verifier

σusk

Desig

usk, m

σ

Usermpk, id,m, σ

UKeyGen

msk, id

usk

I σ is a signature on m that shows the signer has knowledgeof usk

I In the Random Oracle Model, signatures can beconstructed using Fiat-Shamir heuristic from Σ protocols.

I So again the only thing we need is:I A Σ protocol for proof of knowledge of a signature on a

message.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 14: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Research Question

So, What’s the problem Then?

Although any NP relation has a Σ protocol, these genericprotocols are normally not efficient!

Is there any more efficient way to do it?

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 15: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Formulation of Patterns

Yes, There Is a Way!

We don’t actually need strict honest-verifier zero-knowledge!

ExampleSchnorr signature:

pk = (p, q, g, h = gx) , σ = (c, z) : c = H (gz · h−c, m)

To prove knowledge of a signatureI give out aux= gz · h−c

I prove knowledge of z : gz = aux· hH(aux,m)

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 16: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Formulation of Patterns

Yes, There Is a Way!

We don’t actually need strict honest-verifier zero-knowledge!

ExampleSchnorr signature:

pk = (p, q, g, h = gx) , σ = (c, z) : c = H (gz · h−c, m)

To prove knowledge of a signatureI give out aux= gz · h−c

I prove knowledge of z : gz = aux· hH(aux,m)

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 17: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Formulation of Patterns

Yes, There Is a Way!

We don’t actually need strict honest-verifier zero-knowledge!

ExampleSchnorr signature:

pk = (p, q, g, h = gx) , σ = (c, z) : c = H (gz · h−c, m)

To prove knowledge of a signatureI give out aux= gz · h−c

I prove knowledge of z : gz = aux· hH(aux,m)

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 18: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Formulation of Patterns

Defining Class C of Signatures

There exist Convert and Retrieve s.t.

σ̃ ← Convert (pk, m, σ) ⇒ σ ← Retrieve (pk, m, σ̃)

and if σ̃ = (aux, pre) then there exists:

I An AuxSim that AuxSim (pk, m) simulates aux, and

I A Σ protocol for proof of knowledge of a pre for known pk,m, and aux.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 19: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Formulation of Patterns

Defining Class C of Signatures

There exist Convert and Retrieve s.t.

σ̃ ← Convert (pk, m, σ) ⇒ σ ← Retrieve (pk, m, σ̃)

and if σ̃ = (aux, pre) then there exists:

I An AuxSim that AuxSim (pk, m) simulates aux, and

I A Σ protocol for proof of knowledge of a pre for known pk,m, and aux.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 20: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Formulation of Patterns

Defining Class C of Signatures

There exist Convert and Retrieve s.t.

σ̃ ← Convert (pk, m, σ) ⇒ σ ← Retrieve (pk, m, σ̃)

and if σ̃ = (aux, pre) then there exists:

I An AuxSim that AuxSim (pk, m) simulates aux, and

I A Σ protocol for proof of knowledge of a pre for known pk,m, and aux.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 21: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Formulation of Patterns

Defining Class C of Signatures

There exist Convert and Retrieve s.t.

σ̃ ← Convert (pk, m, σ) ⇒ σ ← Retrieve (pk, m, σ̃)

and if σ̃ = (aux, pre) then there exists:

I An AuxSim that AuxSim (pk, m) simulates aux, and

I A Σ protocol for proof of knowledge of a pre for known pk,m, and aux.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 22: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Formulation of Patterns

Which Signatures Does Class C Cover?

RSA-FDH, Schnorr, Modified ElGamal, Boneh-Lynn-Shacham,Boneh-Boyen, Cramer-Shoup, Camenisch-Lysyanskaya-02,Camenisch-Lysyanskaya-04, Goldwasser-Micali-Rivest,Gennaro-Halevi-Rabin, and Cramer-Shoup.

But not PSS of Bellare and Rogaway!

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 23: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Formulation of Patterns

Which Signatures Does Class C Cover?

RSA-FDH, Schnorr, Modified ElGamal, Boneh-Lynn-Shacham,Boneh-Boyen, Cramer-Shoup, Camenisch-Lysyanskaya-02,Camenisch-Lysyanskaya-04, Goldwasser-Micali-Rivest,Gennaro-Halevi-Rabin, and Cramer-Shoup.

But not PSS of Bellare and Rogaway!

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 24: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our UDVS Construction and Its Security

How to Construct a UDVS from a Signature?

Use signature to sign

To designate:

(aux, pre)← Convert (pks, m, σ)

δ ← SoK{(pre∨ skv) : Valid (pks, m, (aux, pre)) , Pair (pkv, skv)}

σ̂ ← (aux, δ)

Verification is straightforward.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 25: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our UDVS Construction and Its Security

How to Construct a UDVS from a Signature?

Use signature to sign

To designate:

(aux, pre)← Convert (pks, m, σ)

δ ← SoK{(pre∨ skv) : Valid (pks, m, (aux, pre)) , Pair (pkv, skv)}

σ̂ ← (aux, δ)

Verification is straightforward.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 26: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our UDVS Construction and Its Security

How to Construct a UDVS from a Signature?

Use signature to sign

To designate:

(aux, pre)← Convert (pks, m, σ)

δ ← SoK{(pre∨ skv) : Valid (pks, m, (aux, pre)) , Pair (pkv, skv)}

σ̂ ← (aux, δ)

Verification is straightforward.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 27: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our UDVS Construction and Its Security

Security of Our UDVS Construction

Let SS be any signature in C and PSS be its underlying problem.Also, let KT be any key type in K and PKT be its underlyingproblem. Then our UDVS construction:

I is DV-unforgeable if PSS and PKT are both hard.I achieves non-transferability privacy.I is non-delegatable if the challenge space of the proof

protocol is big enough.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 28: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our UDVS Construction and Its Security

Security of Our UDVS Construction

Let SS be any signature in C and PSS be its underlying problem.Also, let KT be any key type in K and PKT be its underlyingproblem. Then our UDVS construction:

I is DV-unforgeable if PSS and PKT are both hard.I achieves non-transferability privacy.I is non-delegatable if the challenge space of the proof

protocol is big enough.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 29: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our UDVS Construction and Its Security

Security of Our UDVS Construction

Let SS be any signature in C and PSS be its underlying problem.Also, let KT be any key type in K and PKT be its underlyingproblem. Then our UDVS construction:

I is DV-unforgeable if PSS and PKT are both hard.I achieves non-transferability privacy.I is non-delegatable if the challenge space of the proof

protocol is big enough.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 30: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our UDVS Construction and Its Security

Security of Our UDVS Construction

Let SS be any signature in C and PSS be its underlying problem.Also, let KT be any key type in K and PKT be its underlyingproblem. Then our UDVS construction:

I is DV-unforgeable if PSS and PKT are both hard.I achieves non-transferability privacy.I is non-delegatable if the challenge space of the proof

protocol is big enough.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 31: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our UDVS Construction and Its Security

How Good is Our Construction?

Comparison between Steinfeld et al’s and our constructions

Scheme Hard probl.Desig cost

σ̂ size NDoff-line on-line

DVSBM BDH none 1 pair. 1.0 kb ✗

BLS+DL CDH 2 pair. 1 mult. 5.3 kb ✓

SchUDVS1 SDH 1 exp. 1 exp. 2.0 kb ✗

SchUDVS2 DL 2 exp. 1 exp. 1.5 kb ?Schnorr+DL DL 4 exp. 1 mult. 5.3 kb ✓

RSAUDVS RSA 1 exp. 2 exp. 11.6 kb ?RSA-FDH+DL RSA & DL 2 exp. 1 mult. 4.3 kb ✓

ND: non-delegatability

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 32: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our UDVS Construction and Its Security

Further Constructions

I universal multi-designated-verifier signatures: throughnon-interactive proof of knowledge of one out of n + 1values: a (converted) signature and the secret keys of then verifiers.

I designate more than one signature at once: e.g. to showat least k out of n certificates to a verifier, construct anon-interactive proof of knowledge of k + 1 out of n + 1values: n (converted) signatures and the secret key of theverifier.

I a combination of the above two

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 33: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our UDVS Construction and Its Security

Further Constructions

I universal multi-designated-verifier signatures: throughnon-interactive proof of knowledge of one out of n + 1values: a (converted) signature and the secret keys of then verifiers.

I designate more than one signature at once: e.g. to showat least k out of n certificates to a verifier, construct anon-interactive proof of knowledge of k + 1 out of n + 1values: n (converted) signatures and the secret key of theverifier.

I a combination of the above two

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 34: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our UDVS Construction and Its Security

Further Constructions

I universal multi-designated-verifier signatures: throughnon-interactive proof of knowledge of one out of n + 1values: a (converted) signature and the secret keys of then verifiers.

I designate more than one signature at once: e.g. to showat least k out of n certificates to a verifier, construct anon-interactive proof of knowledge of k + 1 out of n + 1values: n (converted) signatures and the secret key of theverifier.

I a combination of the above two

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 35: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our IBS Construction and Its Security

How to Construct an IBS?

Use signature to issue user secret keys (signatures) onidentities (messages)usk← SS.Sign (msk, id)

To sign:(aux, pre)← Convert (mpk, id, usk)δ ← SoK{pre : Valid (mpk, id, (aux, pre))} (m)σ ← (aux, δ)

Verification is straightforward.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 36: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our IBS Construction and Its Security

How to Construct an IBS?

Use signature to issue user secret keys (signatures) onidentities (messages)usk← SS.Sign (msk, id)

To sign:(aux, pre)← Convert (mpk, id, usk)δ ← SoK{pre : Valid (mpk, id, (aux, pre))} (m)σ ← (aux, δ)

Verification is straightforward.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 37: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our IBS Construction and Its Security

How to Construct an IBS?

Use signature to issue user secret keys (signatures) onidentities (messages)usk← SS.Sign (msk, id)

To sign:(aux, pre)← Convert (mpk, id, usk)δ ← SoK{pre : Valid (mpk, id, (aux, pre))} (m)σ ← (aux, δ)

Verification is straightforward.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 38: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our IBS Construction and Its Security

Security and Further Construction

Let SS be a standard signature in C and PSS be its underlyingproblem. Our IBS construction is ID-EUF-CMA-secure if PSS ishard.

Further constructions:I hierarchical identity-based signaturesI identity-based universal designated verifier signaturesI identity-based ring signatures

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 39: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Our IBS Construction and Its Security

Security and Further Construction

Let SS be a standard signature in C and PSS be its underlyingproblem. Our IBS construction is ID-EUF-CMA-secure if PSS ishard.

Further constructions:I hierarchical identity-based signaturesI identity-based universal designated verifier signaturesI identity-based ring signatures

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 40: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Concluding Remarks

Summary

Our constructions:I are almost generic, yet comparable in size and cost.I are provably non-delegatable and also offer signer-verifier

setting independence.I can be extended to generic UMDVS, HIBS, IBUDVS, and

IBRS.

However:I our security proofs are in the Random Oracle Model.I our security reductions are not tight.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 41: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Concluding Remarks

Summary

Our constructions:I are almost generic, yet comparable in size and cost.I are provably non-delegatable and also offer signer-verifier

setting independence.I can be extended to generic UMDVS, HIBS, IBUDVS, and

IBRS.

However:I our security proofs are in the Random Oracle Model.I our security reductions are not tight.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 42: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Concluding Remarks

Summary

Our constructions:I are almost generic, yet comparable in size and cost.I are provably non-delegatable and also offer signer-verifier

setting independence.I can be extended to generic UMDVS, HIBS, IBUDVS, and

IBRS.

However:I our security proofs are in the Random Oracle Model.I our security reductions are not tight.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 43: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Concluding Remarks

Summary

Our constructions:I are almost generic, yet comparable in size and cost.I are provably non-delegatable and also offer signer-verifier

setting independence.I can be extended to generic UMDVS, HIBS, IBUDVS, and

IBRS.

However:I our security proofs are in the Random Oracle Model.I our security reductions are not tight.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 44: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Concluding Remarks

Summary

Our constructions:I are almost generic, yet comparable in size and cost.I are provably non-delegatable and also offer signer-verifier

setting independence.I can be extended to generic UMDVS, HIBS, IBUDVS, and

IBRS.

However:I our security proofs are in the Random Oracle Model.I our security reductions are not tight.

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 45: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Final Notes

Acknowledgment and Further Reading

Thanks to:I iCORE Information Security Lab of Uni of CalgaryI Shaoquan Jiang and anonymous reviewers of PKC ′08

Full paper:

Shahandashti and Safavi-Naini.Construction of Universal Designated-Verifier Signaturesand Identity-Based Signatures from Standard Signatures.Cryptology ePrint Archive, Report 2007/462 (2007).http://eprint.iacr.org/2007/462

UDVS & IBS from Signatures Universities of Wollongong and Calgary

Page 46: Construction of Universal Designated-Verifier Signatures ...€¦ · Motivation Research Question Results Conclusion Notes Universal Designated-Verifier Signatures How can we construct

Motivation Research Question Results Conclusion Notes

Final Notes

Acknowledgment and Further Reading

Thanks to:I iCORE Information Security Lab of Uni of CalgaryI Shaoquan Jiang and anonymous reviewers of PKC ′08

Full paper:

Shahandashti and Safavi-Naini.Construction of Universal Designated-Verifier Signaturesand Identity-Based Signatures from Standard Signatures.Cryptology ePrint Archive, Report 2007/462 (2007).http://eprint.iacr.org/2007/462

UDVS & IBS from Signatures Universities of Wollongong and Calgary


Recommended