Unique Signatures and Verifiable Random Functions from the DH-DDH Separation

作者: Anna Lysyanskaya

DOI: 10.1007/3-540-45708-9_38

关键词:

摘要: A unique signature scheme has the property that a ?PK(m) is (hard-to-compute) function of public key PK and message m, for all, even adversarially chosen, PK. Unique signatures, introduced by Goldwasser Ostrovsky, have been shown to be building block constructing verifiable random functions. Another useful signatures they are stateless: signer does not need update his secret after an invocation.The only previously known construction in plain model was based on RSA assumption. The other provably secure constructions stateless were Strong Here, we give generalization Diffie-Hellman assumption groups where decisional easy. Several recent results suggest plausibility such groups.We also few related functions (VRFs). VRFs, Micali, Rabin, Vadhan, objects combine properties pseudorandom (i.e. indistinguishability from querying) with verifiability property. Prior our work, VRFs exist under

参考文章(25)
Silvio Micali, Paul Feldman, Manuel Blum, Non-Interactive Zero-Knowledge and Its Applications (Extended Abstract) symposium on the theory of computing. pp. 103- 112 ,(1988)
Silvio Micali, Alfredo De Santis, Manuel Blum, Giuseppe Persiano, Non-Interactive Zero Knowledge ,(1990)
Antoine Joux, A One Round Protocol for Tripartite Diffie-Hellman algorithmic number theory symposium. ,vol. 1838, pp. 385- 394 ,(2000) , 10.1007/10722028_23
Rafail Ostrovsky, Shafi Goldwasser, Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract) international cryptology conference. pp. 228- 245 ,(1992)
Shafi Goldwasser, Rafail Ostrovsky, Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent international cryptology conference. pp. 228- 245 ,(1992) , 10.1007/3-540-48071-4_16
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Rosario Gennaro, Shai Halevi, Tal Rabin, Secure hash-and-sign signatures without the random oracle theory and application of cryptographic techniques. pp. 123- 139 ,(1999) , 10.1007/3-540-48910-X_9
Dan Boneh, Ben Lynn, Hovav Shacham, Short Signatures from the Weil Pairing international conference on the theory and application of cryptology and information security. pp. 514- 532 ,(2001) , 10.1007/3-540-45682-1_30
Mihir Bellare, Moti Yung, Certifying Permutations: Noninteractive zero-knowledge based on any trapdoor permutation Journal of Cryptology. ,vol. 9, pp. 149- 166 ,(1996) , 10.1007/BF00208000
Uriel Feige, Dror Lapidot, Adi Shamir, Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions SIAM Journal on Computing. ,vol. 29, pp. 1- 28 ,(1999) , 10.1137/S0097539792230010