Short signatures without random oracles and the SDH assumption in bilinear groups

被引:419
作者
Boneh, Dan [1 ]
Boyen, Xavier [2 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] Voltage Secur Inc, Palo Alto, CA USA
基金
美国国家科学基金会;
关键词
digital signatures; bilinear pairings; strong unforgeability; standard model;
D O I
10.1007/s00145-007-9005-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.
引用
收藏
页码:149 / 177
页数:29
相关论文
共 48 条
[1]  
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[2]  
[Anonymous], PBC PAIRING BASED CR
[3]  
[Anonymous], 2001, LNCS
[4]  
Barreto P., 2005, PAIRING FRIENDLY ELL
[5]  
BARRETO P, 2004, EFFICIENT PAIRING CO
[6]  
Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
[7]  
Bellare M, 1997, LECT NOTES COMPUT SC, V1294, P470
[8]  
Bellare M., 1995, P 1 ACM C COMPUTER C, P62
[9]  
Blake I.F., 1999, LONDON MATH SOC LECT, V265
[10]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55