[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

What a lovely hat

Is it made out of tin foil?

Paper 2025/115

Signatures with Tight Adaptive Corruptions from Search Assumptions

Keitaro Hashimoto, National Institute of Advanced Industrial Science and Technology (AIST)
Wakaha Ogata, Institute of Science Tokyo
Yusuke Sakai, National Institute of Advanced Industrial Science and Technology (AIST)
Abstract

We construct the \emph{first} tightly secure signature schemes in the multi-user setting with adaptive corruptions from static search assumptions, such as classical discrete logarithm, RSA, factoring, or post-quantum group action discrete logarithm assumptions. In contrast to our scheme, the previous tightly secure schemes are based on decisional assumptions (e.g., (group action) DDH) or interactive search assumptions (e.g., one-more CDH). The security of our schemes is independent of the numbers of users, signing queries, and random oracle queries, and forging our signatures is as hard as solving the underlying static search problems. Our signature schemes are based on an identification scheme with multiple secret keys per public key and ``second-key recovery resistance,'' difficulty of finding another secret key of a given public and secret key pair (e.g., Okamoto identification (CRYPTO'92) and Parallel-OR identification (CRYPTO'94)). These properties allow a reduction in solving a search problem while answering signing and corruption queries for all users in the signature security game. To convert such an identification scheme into a signature scheme tightly, we employ randomized Fischlin transformation introduced by Kondi and shelat (Asiacrypt 2022) that provides improved straight-line extraction. Intuitively, the transformation guarantees the tight security of our signature scheme in the programmable random oracle model, but we successfully prove its tight security in the non-programmable random oracle model. Also, as a side contribution, we point out a flaw in the proof for the zero-knowledge property of randomized Fischlin transformation by Kondi and shelat. This paper summarizes what they overlooked in the proof of zero-knowledge property of the transformation, the difficulty of correcting their proof, and how to overcome it.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
Digital signatureMulti-user setting with corruptionTight securitySearch assumptions
Contact author(s)
keitaro hashimoto @ aist go jp
ogata w aa @ m titech ac jp
yusuke sakai @ aist go jp
History
2025-02-14: last of 2 revisions
2025-01-24: received
See all versions
Short URL
https://ia.cr/2025/115
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/115,
      author = {Keitaro Hashimoto and Wakaha Ogata and Yusuke Sakai},
      title = {Signatures with Tight Adaptive Corruptions from Search Assumptions},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/115},
      year = {2025},
      url = {https://eprint.iacr.org/2025/115}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.