Academia.eduAcademia.edu

Outline

Anonymous Signatures Revisited

2009, Lecture Notes in Computer Science

https://doi.org/10.1007/978-3-642-04642-1_13

Abstract

We revisit the notion of the anonymous signature, first formalized by Yang, Wong, Deng and Wang [12], and then further developed by Fischlin [6] and Zhang and Imai . We present a new formalism of anonymous signature, where instead of the message, a part of the signature is withheld to maintain anonymity. We introduce the notion unpretendability to guarantee infeasibility for someone other than the correct signer to pretend authorship of the message and signature. Our definition retains applicability for all previous applications of the anonymous signature, provides stronger security, and is conceptually simpler. We give a generic construction from any ordinary signature scheme, and also show that the short signature scheme by Boneh and Boyen [4] can be naturally regarded as such a secure anonymous signature scheme according to our formalism.

References (13)

  1. Mihir Bellare, Alexandra Boldyreva, Anand Desai, and David Pointcheval. Key- privacy in public-key encryption. In Colin Boyd, editor, ASIACRYPT, volume 2248, pages 566-582. Springer, 2001.
  2. Mihir Bellare and Shanshan Duan. New definitions and designs for anonymous signatures. Cryptology ePrint Archive, Report 2009/336, 2009.
  3. Manuel Blum and Silvio Micali. How to generate cryptographically strong se- quences of pseudo-random bits. SIAM Journal on Computing, 13(4):850-864, 1984.
  4. Dan Boneh and Xavier Boyen. Short signatures without random oracles and the SDH assumption in bilinear groups. Journal of Cryptology, 21(2):149-177, 2008.
  5. Jung Hee Cheon and Dong Hoon Lee. Diffie-Hellman problems and bilinear maps. Cryptology ePrint Archive, Report 2002/117, 2002.
  6. Marc Fischlin. Anonymous signatures made easy. In Tatsuaki Okamoto and Xi- aoyun Wang, editors, Public Key Cryptography, volume 4450, pages 31-42. Springer, 2007.
  7. Steven D. Galbraith and Wenbo Mao. Invisibility and anonymity of undeniable and confirmer signatures. In Marc Joye, editor, CT-RSA, volume 2612, pages 80-97. Springer, 2003.
  8. Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, and Xiaotie Deng. Certificateless signature: a new security model and an improved generic construction. Designs, Codes and Cryptography, 42(2):109-126, 2007.
  9. Alfred Menezes and Nigel P. Smart. Security of signature schemes in a multi-user setting. Designs, Codes and Cryptography, 33(3):261-274, 2004.
  10. Vishal Saraswat and Aaram Yun. Anonymous signatures revisited. Cryptology ePrint Archive, Report 2009/307, 2009.
  11. Takakazu Satoh. On pairing inversion problems. In Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, and Takeshi Okamoto, editors, Pairing, volume 4575, pages 317-328. Springer, 2007.
  12. Guomin Yang, Duncan S. Wong, Xiaotie Deng, and Huaxiong Wang. Anonymous signature schemes. In Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, and Tal Malkin, editors, Public Key Cryptography, volume 3958, pages 347-363. Springer, 2006.
  13. Rui Zhang and Hideki Imai. Strong anonymous signatures. In Moti Yung, Peng Liu, and Dongdai Lin, editors, Inscrypt, volume 5487, pages 60-71. Springer, 2008.