Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings

2021 ◽  
Vol 34 (4) ◽  
Author(s):  
Shuichi Katsumata ◽  
Ryo Nishimaki ◽  
Shota Yamada ◽  
Takashi Yamakawa
2021 ◽  
Vol 29 (2) ◽  
pp. 229-271
Author(s):  
Panagiotis Grontas ◽  
Aris Pagourtzis ◽  
Alexandros Zacharakis ◽  
Bingsheng Zhang

This work formalizes Publicly Auditable Conditional Blind Signatures (PACBS), a new cryptographic primitive that allows the verifiable issuance of blind signatures, the validity of which is contingent upon a predicate and decided by a designated verifier. In particular, when a user requests the signing of a message, blinded to protect her privacy, the signer embeds data in the signature that makes it valid if and only if a condition holds. A verifier, identified by a private key, can check the signature and learn the value of the predicate. Auditability mechanisms in the form of non-interactive zero-knowledge proofs are provided, so that a cheating signer cannot issue arbitrary signatures and a cheating verifier cannot ignore the embedded condition. The security properties of this new primitive are defined using cryptographic games. A proof-of-concept construction, based on the Okamoto–Schnorr blind signatures infused with a plaintext equivalence test is presented and its security is analyzed.


2016 ◽  
Vol 7 (1) ◽  
pp. 61 ◽  
Author(s):  
Yan Ren ◽  
Hongbin Wang ◽  
Jiali Du ◽  
Liqiong Ma
Keyword(s):  

2021 ◽  
Vol 17 (3) ◽  
pp. 155014772110017
Author(s):  
Han-Yu Lin

Fog computing is viewed as an extended technique of cloud computing. In Internet of things–based collaborative fog computing systems, a fog node aggregating lots of data from Internet of things devices has to transmit the information to distributed cloud servers that will collaboratively verify it based on some predefined auditing policy. However, compromised fog nodes controlled by an adversary might inject bogus data to cheat or confuse remote servers. It also causes the waste of communication and computation resources. To further control the lifetime of signing capability for fog nodes, an appropriate mechanism is crucial. In this article, the author proposes a time-constrained strong multi-designated verifier signature scheme to meet the above requirement. In particular, a conventional non-delegatable strong multi-designated verifier signature scheme with low computation is first given. Based on its constructions, we show how to transform it into a time-constrained variant. The unforgeability of the proposed schemes is formally proved based on the famous elliptic curve discrete logarithm assumption. The security requirement of strong signer ambiguity for our substantial constructions is also analyzed by utilizing the intractable assumption of decisional Diffie–Hellman. Moreover, some comparisons in terms of the signature size and computational costs for involved entities among related mechanisms are made.


ETRI Journal ◽  
2012 ◽  
Vol 34 (2) ◽  
pp. 235-244 ◽  
Author(s):  
JuHee Ki ◽  
Jung Yeon Hwang ◽  
DaeHun Nyang ◽  
Beom-Hwan Chang ◽  
Dong Hoon Lee ◽  
...  

Author(s):  
Ivan Damgård ◽  
Helene Haagh ◽  
Rebekah Mercer ◽  
Anca Nitulescu ◽  
Claudio Orlandi ◽  
...  
Keyword(s):  

2020 ◽  
Vol 69 (19) ◽  
pp. 190302
Author(s):  
Min-Xi Rong ◽  
Xiang-Jun Xin ◽  
Fa-Gen Li

Sign in / Sign up

Export Citation Format

Share Document