Paper 2025/115
Signatures with Tight Adaptive Corruptions from Search Assumptions
Abstract
We construct the \emph{first} tightly secure signature schemes in the multi-user setting with adaptive corruptions from static search assumptions, such as classical discrete logarithm, RSA, factoring, or post-quantum group action discrete logarithm assumptions. In contrast to our scheme, the previous tightly secure schemes are based on decisional assumptions (e.g., (group action) DDH) or interactive search assumptions (e.g., one-more CDH). The security of our schemes is independent of the numbers of users, signing queries, and random oracle queries, and forging our signatures is as hard as solving the underlying static search problems. Our signature schemes are based on an identification scheme with multiple secret keys per public key and ``second-key recovery resistance,'' difficulty of finding another secret key of a given public and secret key pair (e.g., Okamoto identification (CRYPTO'92) and Parallel-OR identification (CRYPTO'94)). These properties allow a reduction in solving a search problem while answering signing and corruption queries for all users in the signature security game. To convert such an identification scheme into a signature scheme tightly, we employ randomized Fischlin transformation introduced by Kondi and shelat (Asiacrypt 2022) that provides improved straight-line extraction. Intuitively, the transformation guarantees the tight security of our signature scheme in the programmable random oracle model, but we successfully prove its tight security in the non-programmable random oracle model. Also, as a side contribution, we point out a flaw in the proof for the zero-knowledge property of randomized Fischlin transformation by Kondi and shelat. This paper summarizes what they overlooked in the proof of zero-knowledge property of the transformation, the difficulty of correcting their proof, and how to overcome it.
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Preprint.
- Keywords
- Digital signatureMulti-user setting with corruptionTight securitySearch assumptions
- Contact author(s)
-
keitaro hashimoto @ aist go jp
ogata w aa @ m titech ac jp
yusuke sakai @ aist go jp - History
- 2025-02-14: last of 2 revisions
- 2025-01-24: received
- See all versions
- Short URL
- https://ia.cr/2025/115
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/115, author = {Keitaro Hashimoto and Wakaha Ogata and Yusuke Sakai}, title = {Signatures with Tight Adaptive Corruptions from Search Assumptions}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/115}, year = {2025}, url = {https://eprint.iacr.org/2025/115} }