1-out-of-2 Signature Jun Shao 2 Whats 1-out-of-2 Signature Mirosaw - - PowerPoint PPT Presentation

1 out of 2 signature
SMART_READER_LITE
LIVE PREVIEW

1-out-of-2 Signature Jun Shao 2 Whats 1-out-of-2 Signature Mirosaw - - PowerPoint PPT Presentation

1-out-of-2 Signature Mirosaw Kutyowski 1 and 1-out-of-2 Signature Jun Shao 2 Whats 1-out-of-2 Signature Mirosaw Kutyowski 1 and Jun Shao 2 Definitions of 1-out-of-2 signature 1 Institute of Mathematics and Computer Science Our


slide-1
SLIDE 1

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

1-out-of-2 Signature

Mirosław Kutyłowski1 and Jun Shao2

1Institute of Mathematics and Computer Science

Wrocław University of Technology

2College of Computer and Information Engineering

Zhejiang Gongshang University

2011-3-22

slide-2
SLIDE 2

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Table of Content

1

What’s 1-out-of-2 Signature

2

Definitions of 1-out-of-2 signature

3

Our proposal

4

Extension

slide-3
SLIDE 3

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Signature with delegation capability

In digital signature, when the signer is absent, he/she will delegate his/her signing rights to a proxy.

slide-4
SLIDE 4

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Signature with delegation capability

In digital signature, when the signer is absent, he/she will delegate his/her signing rights to a proxy. Proxy signature

slide-5
SLIDE 5

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Signature with delegation capability

In digital signature, when the signer is absent, he/she will delegate his/her signing rights to a proxy. Proxy signature Proxy re-signature

slide-6
SLIDE 6

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Signature with delegation capability

In digital signature, when the signer is absent, he/she will delegate his/her signing rights to a proxy. Proxy signature Proxy re-signature Mediated signature

slide-7
SLIDE 7

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Signature with delegation capability

In digital signature, when the signer is absent, he/she will delegate his/her signing rights to a proxy. Proxy signature

In a proxy signature scheme, the original signer delegates his/her signing rights to a proxy, who can sign messages on behalf of the original signer afterwards.

slide-8
SLIDE 8

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Signature with delegation capability

In digital signature, when the signer is absent, he/she will delegate his/her signing rights to a proxy. Proxy signature Proxy re-signature

In a proxy re-signature scheme, a proxy can transform a signature of the delegatee to another signature of the delegator on the same message.

slide-9
SLIDE 9

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Signature with delegation capability

In digital signature, when the signer is absent, he/she will delegate his/her signing rights to a proxy. Proxy signature Proxy re-signature Mediated signature

In a mediated signature scheme, an on-line semi-trusted mediator (SEM) should involve in every signing process to help the original signer to generate the signature.

slide-10
SLIDE 10

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Scenario

In some cases, the signer just wanna give the proxy the limited delegation, which satisfies that The proxy can generate the signature on only one message from two given messages. The signature generated by the proxy is indistinguishable from the one by the signer.

slide-11
SLIDE 11

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Scenario

Proxy signature ✖

Distinguishable

slide-12
SLIDE 12

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Scenario

Proxy signature ✖

Distinguishable

Proxy re-signature ✖

Public key is changed

slide-13
SLIDE 13

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Scenario

Proxy signature ✖

Distinguishable

Proxy re-signature ✖

Public key is changed

Mediated signature ✖

The proxy is always involved

slide-14
SLIDE 14

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Functionality of 1-out-of-2 signature

1-out-of-2 signature is a kind of signature with delegation capability.

slide-15
SLIDE 15

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Functionality of 1-out-of-2 signature

1-out-of-2 signature is a kind of signature with delegation

  • capability. In particular,

The proxy can transform one of two given partial signatures of the signer into one full signature.

slide-16
SLIDE 16

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Functionality of 1-out-of-2 signature

1-out-of-2 signature is a kind of signature with delegation

  • capability. In particular,

The proxy can transform one of two given partial signatures of the signer into one full signature. The proxy can transform only one of the two given partial signatures; otherwise, the secret key of the proxy will be revealed.

slide-17
SLIDE 17

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Definition

SKeyGen(1k) → (pkS, skS). PKeyGen(1k) → (pkP, skP). PreSign(skS, pkP, (m0, m1)) → ((σ0, m0), (σ1, m1)). Trans(σ0, σ1, skP) → σ′

b, (b ∈ {0, 1}).

Verify((σ′, m), pkS) → 1 or 0. Reveal((σ0, σ1), (σ′

0, σ′ 1), pkP) → skP.

slide-18
SLIDE 18

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Security Model—Existential Unforgeability

Setup (pkS, skS), (pkP, skP). Queries Secret key oracle OPsk. Partial signature generation oracle Ops. Full signature generation oracle Ot. Forgery The adversary outputs a full signature (σ∗, m∗). Verify((σ∗, m∗), pkS) → 1. (∗, m∗) has not been queried to Ot. m∗ has not been queried to Ops or OPsk has not been queried.

slide-19
SLIDE 19

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Security Model—Confidentiality

Setup Identical to that in the game for Existential Unforgeability. Queries Secret key oracle OSsk. Partial signature generation oracle Ops. Full signature generation oracle Ot. Output The adversary wins if he/she outputs the proxy’s secret key skP.

slide-20
SLIDE 20

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Our proposal—one-time signature method

It works in a finite cyclic group G =< g > with prime order p. SKeyGen: X = gx ∈ G, x ∈ Z ∗

p .

PKeyGen: Y = gy ∈ G, y ∈ Z ∗

p .

PreSign: (x, Y, m0, m1)

The proxy sends A = ga to the signer, where a is a random number from Z ∗

p .

On receiving A, the signer computes two partial signatures on m0, m1 as follows. For (b′ = 0, 1) Rb′ = (Y H1(Y||A||b′) · A) · grb′ , Sb′ = rb′ + H2(mb′||Rb′) · x mod p, where rb′, (b′ = 0, 1) are random numbers from Z ∗

p .

The signer sends (Rb′, Sb′, b′), (b′ = 0, 1) to the proxy.

slide-21
SLIDE 21

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Our proposal

Trans: On input (Rb′, Sb′, mb′), (b′ = 0, 1), a, y, it

  • utputs (R′

b, S′ b, b), (b ∈ {0, 1}):

R′

b = Rb, S′ b = Sb + (y · H1(Y||ga||b) + a) mod p.

Verify: On input (R′, S′, m), X, it outputs 1 if gS′ = R′ · X H2(m||R′) holds; otherwise, it outputs 0. Reveal: On input (Rb′, Sb′, b′), (b′ = 0, 1), (R′

b′, S′ b′, b′), (b′ = 0, 1), A, Y, it outputs y.

S′

0 − S0 = y · H1(Y||A||0) + a mod p,

S′

1 − S1 = y · H1(Y||A||1) + a mod p.

slide-22
SLIDE 22

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Security analysis

Theorem The above proposal is existentially unforgeable and confidential in the random oracle model based on the DL assumption.

slide-23
SLIDE 23

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

1-out-of-k signature

In algorithm PreSign, the signer returns k partial signatures to the proxy, other algorithms remain the same.

slide-24
SLIDE 24

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Strong 1-out-of-2 signature

The adversary has the unlimited computational power while the signer or the proxy only has the polynomially bounded power.

slide-25
SLIDE 25

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Strong 1-out-of-2 signature scheme—fail-stop signature method

SKeyGen: The signer chooses 4ℓ + 2 random numbers x(0)

1 , x(0) 2 , {x(i) 1 , x(i) 2 , x(i) 3 , x(i) 4 }ℓ i=1 from Z ∗ p , and computes

X (0) = gx(0)

1 hx(0) 2

and X (i) = gx(i)

1 hx(i) 3 , X (i)

1

= gx(i)

2 hx(i) 4 for

(i = 1, · · · , ℓ). The public key is X = (X (0), {X (i)

0 , X (i) 1 }ℓ i=1),

and the secret key is ① = (x(0)

1 , x(0) 2 , {x(i) 1 , x(i) 2 , x(i) 3 , x(i) 4 }ℓ i=1).

slide-26
SLIDE 26

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Strong 1-out-of-2 signature scheme

PKeyGen: The proxy chooses 2ℓ + 2 random numbers {y(i)

1 , y(i) 2 }ℓ i=0 from Z ∗ p , and computes Y (0) i

= gy(i)

1 hy(i) 2 for

(i = 0, · · · , ℓ). The public key is Y = {Y (i)}ℓ

i=0,

and the secret key is ② = {y(i)

1 , y(i) 2 }ℓ i=0.

slide-27
SLIDE 27

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Strong 1-out-of-2 signature scheme

PreSign: On input the signer’s secret key ① = (x(0)

1 , x(0) 2 , {x(i) 1 , x(i) 2 , x(i) 3 , x(i) 4 }ℓ i=1), the proxy’s

public key Y = {Y (i)}ℓ

i=0, and two messages m0, m1

from the message space, the partial signature generation algorithm is performed as follows.

Assume that it is the κ-th time, then the signer computes two partial signatures on m0, m1 as follows. For (b′ = 0, 1) σ(1)

b′ =

x(0)

1

+ H2(mb′||κ) · x(κ)

1+b′ mod p,

σ(2)

b′ =

x(0)

2

+ H2(mb′||κ) · x(κ)

3+b′ mod p.

The signer sends (κ, b′, σ(1)

b′ , σ(2) b′ ), (b′ = 0, 1) to the

proxy.

slide-28
SLIDE 28

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Strong 1-out-of-2 signature scheme

Trans: On input two partial signatures (κ, b′, σ(1)

b′ , σ(2) b′ ),

(b′ = 0, 1), the 1-out-of-2 full signature generation algorithm outputs a full signature (κ, b, σ(1)

b ′, σ(2) b ′),

(b ∈ {0, 1}). σ(1)

b ′ =

σ(1)

b

+ (y(0)

1

+ y(κ)

1

· H1(κ||b)) mod p, σ(2)

b ′ =

σ(2)

b

+ (y(0)

2

+ y(κ)

2

· H1(κ||b)) mod p.

slide-29
SLIDE 29

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Strong 1-out-of-2 signature scheme

Verify: On input a full signature (κ, b, σ(1)′, σ(2)′, m), the signer’s public key X, it outputs 1 if gσ′(1) · hσ′(2) = (X (0) · Y (0) · (Y (κ))H1(κ||b)) · (X (κ)

b

)H2(m||κ) holds; otherwise, it outputs 0.

slide-30
SLIDE 30

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Strong 1-out-of-2 signature scheme

Reveal: On input two partial signatures (κ, b′, σ(1)

b′ , σ(2) b′ ), (b′ = 0, 1), two full signatures

(κ, b′, σ(1)

b′ ′, σ(2) b′ ′), (b′ = 0, 1), and the proxy’s public key

Y, it outputs the proxy’s secret key (y(0)

1 , y(0) 2 ) by the

following equations.            σ(1)

′ − σ(1)

= y(0)

1

+ y(κ)

1

· H1(κ||0) mod p, σ(2)

′ − σ(2)

= y(0)

2

+ y(κ)

2

· H1(κ||0) mod p, σ(1)

1 ′ − σ(1) 1

= y(0)

1

+ y(κ)

1

· H1(κ||1) mod p, σ(2)

1 ′ − σ(2) 1

= y(0)

2

+ y(κ)

2

· H1(κ||1) mod p,

slide-31
SLIDE 31

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Strong 1-out-of-2 signature scheme

Stop-fail: With a forgery (κ∗, b∗, (σ(1)′)∗, (σ(2)′)∗, m∗), the proxy and the signer do the following steps: The signer generates a partial signature (κ∗, b∗, σ(1), σ(2), m∗), and sends it to the proxy with (κ∗, b∗, (σ(1)′)∗, (σ(2)′)∗, m∗). Upon receiving the data from the signer, the proxy first checks the validity of the received data. If it is valid, then the proxy computes and outputs the full signature (κ∗, b∗, σ(1)′, σ(2)′, m∗); otherwise, the proxy aborts the algorithm.

slide-32
SLIDE 32

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Security analysis

Theorem The strong 1-out-of-2 signature scheme is existentially unforgeable and confidential in the standard model based

  • n the DL assumption.
slide-33
SLIDE 33

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Future work

Non-interactive t-out-of-n · · ·

slide-34
SLIDE 34

1-out-of-2 Signature Mirosław Kutyłowski1 and Jun Shao2 What’s 1-out-of-2 Signature Definitions of 1-out-of-2 signature Our proposal Extension

Thank you for your attention!