Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1755688.1755698acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Dynamic fully forward-secure group signatures

Published: 13 April 2010 Publication History

Abstract

Enhancing user privacy while allowing the use of digital credentials in network-wide applications is a very active area. Group signatures are primary privacy-preserving credentials that enable both, non-repudiation and abuser-tracing.
When embedding cryptographic tools in actual computing systems, it is important to ensure physical layer protection to cryptographic keys. A simple risk analysis shows that taking advantage of system (i.e., hardware, software, network) vulnerabilities is usually much easier than cryptanalyzing the cryptographic primitives themselves. Forward-secure cryptosystems, in turn, are one of the suggested protective measures, where private keys periodically evolve in such a way that, if a break-in occurs, past uses of those keys in earlier periods are protected.
At CCS 2001, Song argued why key exposures may cause even more important concerns in the context of group signatures (namely, under the mask of anonymity within a group of other key holders). She then gave two examples of forward-secure group signatures, and argued their ad hoc properties based on the state of understanding of group signature security properties at that time (proper security models had not been formalized yet). These implementations are fruitful initial efforts, but still suffer from certain imperfections. In the first scheme for instance, forward security is only guaranteed to signers as long as the group manager's private key is safe. Another scheme recently described by Nakanishi et al. for static groups also fails to maintain security when the group manager is compromised.
In this paper, we reconsider the subject and first formalize the notion of "fully forward-secure group signature" (FS-GS) in dynamic groups. We carefully define the correctness and security properties that such a scheme ought to have. We then give a realization of the primitive with quite attractive features: constant-size signatures, constant cost of signing/verifying, and at most polylog complexity of other metrics. The scheme is further proven secure in the standard model (no random oracle idealization is used).

References

[1]
M. Abdalla and L. Reyzin. A new forward-secure digital signature scheme. In ASIACRYPT'00, pp. 116--129, 2000.
[2]
M. Abe and S. Fehr. Perfect NIZK with adaptive soundness. In TCC'07, pp. 118--136, 2007.
[3]
R. Anderson. Two remarks on public key cryptology. In ACM-CCS'97, 1997. Invited talk.
[4]
G. Ateniese, J. Camenisch, S. Hohenberger, and B. de Medeiros. Practical group signatures without random oracles. Cryptology ePrint Archive: Report 2005/385, 2005.
[5]
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In CRYPTO'00, pp. 255--270, 2000.
[6]
M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, and H. Shacham. Delegatable anonymous credentials. Cryptology ePrint Archive: Report 2008/428, 2008.
[7]
M. Belenkiy, M. Chase, M. Kohlweiss, and A. Lysyanskaya. P-signatures and noninteractive anonymous credentials. In TCC'08, pp. 356--374, 2008.
[8]
M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In EUROCRYPT'03, pp. 614--629, 2003.
[9]
M. Bellare and S. Miner. A forward-secure digital signature scheme. In CRYPTO'99, pp. 431--448, 1999.
[10]
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM-CCS'93, pp. 62--73, 1993.
[11]
M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures: The case of dynamic groups. In CT-RSA'05, pp. 136--153, 2005.
[12]
D. Boneh and X. Boyen. Efficient selective-ID secure identity based encryption without random oracles. In EUROCRYPT'04, pp. 223--238, 2004.
[13]
D. Boneh and X. Boyen. Short signatures without random oracles. In EUROCRYPT'04, pp. 56--73, 2004.
[14]
D. Boneh, X. Boyen, and E.-J. Goh. Hierarchical identity based encryption with constant size ciphertext. In EUROCRYPT'05, pp. 440--456, 2005.
[15]
D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In CRYPTO'04, pp. 41--55, 2004.
[16]
D. Boneh and H. Shacham. Group signatures with verifier-local revocation. In ACM-CCS'04, pp. 168--177, 2004.
[17]
X. Boyen, Q. Mei, and B. Waters. Direct chosen ciphertext security from identity-based techniques. In ACM-CCS'05, pp. 320--329, 2005.
[18]
X. Boyen, H. Shacham, E. Shen, and B. Waters. Forward-secure signatures with untrusted update. In ACM-CCS'06, pp. 191--200, 2006.
[19]
X. Boyen and B. Waters. Compact group signatures without random oracles. In EUROCRYPT'06, pp. 427--444, 2006.
[20]
X. Boyen and B. Waters. Full-domain subgroup hiding and constant-size group signatures. In PKC'07, pp. 1--15, 2007.
[21]
J. Camenisch, N. Chandran, and V. Shoup. A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. In EUROCRYPT'09, 2009.
[22]
R. Canetti, S. Halevi, and J. Katz. A forward-secure public-key encryption scheme. In EUROCRYPT'03, pp. 255--271, 2003.
[23]
D. Chaum and E. van Heyst. Group signatures. In EUROCRYPT'91, pp. 257--265. Springer, 1991.
[24]
I. Damgård. Towards practical public key systems secure against chosen ciphertext attacks. In CRYPTO'91, pp. 445--456, 1991.
[25]
A. Dent. The hardness of the DHK problem in the generic group model. Cryptology ePrint Archive: Report 2006/156, 2006.
[26]
Y. Dodis, J. Katz, S. Xu, and M. Yung. Key-insulated public key cryptosystems. In EUROCRYPT'02, pp. 65--82, 2002.
[27]
J. Groth, R. Ostrovsky, and A. Sahai. Non-interactive zaps and new techniques for NIZK. In CRYPTO'06, pp. 97--111, 2006.
[28]
J. Groth. Simulation-sound NIZK proofs for a practical language and constant size group signatures. In ASIACRYPT'06, pp. 444--459, 2006.
[29]
J. Groth. Fully anonymous group signatures without random oracles. In ASIACRYPT'07, pp. 164--180, 2007.
[30]
J. Groth and A. Sahai. Efficient non-interactive proof systems for bilinear groups. In EUROCRYPT'08, pp. 415--432, 2008.
[31]
G. Itkis and L. Reyzin. Forward-secure signatures with optimal signing and verifying. In CRYPTO'01, pp. 332--354, 2001.
[32]
G. Itkis and L. Reyzin. Sibir: Signer-base intrusion-resilient signatures. In CRYPTO'02, pp. 499--514, 2002.
[33]
A. Kiayias, Y. Tsiounis, and M. Yung. Traceable signatures. In EUROCRYPT'04, pp. 571--589, 2004.
[34]
A. Kiayias and M. Yung. Secure scalable group signature with dynamic joins and separable authorities. International Journal of Security and Networks (IJSN) Vol. 1, No. 1/2, pp. 24--45, 2006. Earlier version appeared as Cryptology ePrint Archive: Report 2004/076, 2004.
[35]
A. Kiayias and M. Yung. Group signatures with efficient concurrent join. In EUROCRYPT'05, pp. 198--214, 2005.
[36]
E. Kiltz. Chosen-ciphertext security from tag-based encryption. In TCC'06, pp. 581--600, 2006.
[37]
H. Krawczyk. Simple forward-secure signatures from any signature scheme. In ACM-CCS'00, pp. 108--115, 2000.
[38]
B. Libert, M. Yung. Efficient Traceable Signatures in the Standard Model. In Pairing'09, pp. 187--205, 2009.
[39]
T. Malkin, D. Micciancio, and S. Miner. Efficient generic forward-secure signatures with an unbounded number of time periods. In EUROCRYPT'02, pp. 400--417, 2002.
[40]
M. Naor. On cryptographic assumptions and challenges. In CRYPTO'03, pp. 96--109, 2003.
[41]
T. Nakanishi, Y. Hira, N. Funabiki. Forward-Secure Group Signatures from Pairings. In Pairing'09, pp. 171--186 2009.
[42]
L. Nguyen and R. Safavi-Naini. Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. In ASIACRYPT'04, pp. 372--386, 2004.
[43]
D. Song. Practical forward secure group signature schemes. In ACM-CCS'01, pp. 225--234, 2001.
[44]
B. Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT'05, pp. 114--127, 2005.
[45]
D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In ACM-CCS'04, pp. 354--363, 2004.
[46]
R. Zhang. Tweaking TBE/IBE to PKE transforms with chameleon hash functions. In ACNS'07, pp. 323--339, 2007.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
April 2010
363 pages
ISBN:9781605589367
DOI:10.1145/1755688
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymity
  2. forward security
  3. group signatures
  4. key exposure
  5. key protection
  6. security modeling

Qualifiers

  • Research-article

Conference

ASIA CCS '10
Sponsor:

Acceptance Rates

ASIACCS '10 Paper Acceptance Rate 25 of 166 submissions, 15%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)2
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Forward Secure Lattice-Based Ring Signature Scheme in the Standard ModelInformation and Communications Security10.1007/978-981-99-7356-9_9(146-158)Online publication date: 20-Oct-2023
  • (2022)Forward-Secure Revocable Secret Handshakes from LatticesPost-Quantum Cryptography10.1007/978-3-031-17234-2_21(453-479)Online publication date: 21-Sep-2022
  • (2022)Threshold Signatures with Private AccountabilityAdvances in Cryptology – CRYPTO 202210.1007/978-3-031-15985-5_19(551-581)Online publication date: 11-Oct-2022
  • (2020)Constant-Size Lattice-Based Group Signature with Forward Security in the Standard ModelProvable and Practical Security10.1007/978-3-030-62576-4_2(24-44)Online publication date: 20-Nov-2020
  • (2020)Lattice HIBE with Faster Trapdoor Delegation and ApplicationsInformation and Communications Security10.1007/978-3-030-61078-4_12(202-220)Online publication date: 28-Nov-2020
  • (2019)Forward-Secure Group Signatures from LatticesPost-Quantum Cryptography10.1007/978-3-030-25510-7_3(44-64)Online publication date: 14-Jul-2019
  • (2016)Bilateral-secure Signature by Key EvolvingProceedings of the 11th ACM on Asia Conference on Computer and Communications Security10.1145/2897845.2897864(523-533)Online publication date: 30-May-2016
  • (2012)Fully forward-secure group signaturesCryptography and Security10.5555/2184081.2184097(156-184)Online publication date: 1-Jan-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media