Signatures on Randomizable Ciphertexts
2011, Lecture Notes in Computer Science
https://doi.org/10.1007/978-3-642-19379-8_25Abstract
Randomizable encryption allows anyone to transform a ciphertext into a fresh ciphertext of the same message. Analogously, a randomizable signature can be transformed into a new signature on the same message. We combine randomizable encryption and signatures to a new primitive as follows: given a signature on a ciphertext, anyone, knowing neither the signing key nor the encrypted message, can randomize the ciphertext and adapt the signature to the fresh encryption, thus maintaining public verifiability. Moreover, given the decryption key and a signature on a ciphertext, one can compute ("extract") a signature on the encrypted plaintext. As adapting a signature to a randomized encryption contradicts the standard notion of unforgeability, we introduce a weaker notion stating that no adversary can, after querying signatures on ciphertexts of its choice, output a signature on an encryption of a new message. This is reasonable since, due to extractability, a signature on an encrypted message can be interpreted as an encrypted signature on the message. Using Groth-Sahai proofs and Waters signatures, we give several instantiations of our primitive and prove them secure under classical assumptions in the standard model and the CRS setting. As an application, we show how to construct an efficient non-interactive receipt-free universally verifiable e-voting scheme. In such a scheme a voter cannot prove what his vote was, which precludes vote selling. Besides, our primitive also yields an efficient roundoptimal blind signature scheme based on standard assumptions, and namely for the classical Waters signature. Work done while atÉcole normale supérieure, Paris, France.
References (23)
- M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, and M. Ohkubo. Structure-preserving signatures and commitments to group elements. In T. Rabin, editor, Advances in Cryptology -CRYPTO 2010, volume 6223 of Lecture Notes in Computer Science, pages 209-236. Springer, Aug. 2010.
- D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In M. Franklin, editor, Advances in Cryptology - CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 41-55. Springer, Aug. 2004.
- BCC + 09] M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, and H. Shacham. Randomizable proofs and delegatable anonymous credentials. In S. Halevi, editor, Advances in Cryptology -CRYPTO 2009, volume 5677 of Lecture Notes in Computer Science, pages 108-125. Springer, Aug. 2009.
- O. Baudron, P.-A. Fouque, D. Pointcheval, J. Stern, and G. Poupard. Practical multi-candidate election system. In 20th ACM Symposium Annual on Principles of Distributed Computing, pages 274-283. ACM Press, Aug. 2001.
- M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. The power of RSA inversion oracles and the security of Chaum's RSA-based blind signature scheme. In P. F. Syverson, editor, FC 2001: 5th International Conference on Financial Cryptography, volume 2339 of Lecture Notes in Computer Science, pages 319-338. Springer, Feb. 2001.
- M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In V. Ashby, editor, ACM CCS 93: 1st Conference on Computer and Communications Security, pages 62-73. ACM Press, Nov. 1993.
- X. Boyen and B. Waters. Compact group signatures without random oracles. In S. Vaudenay, editor, Advances in Cryptology -EUROCRYPT 2006, volume 4004 of Lecture Notes in Computer Science, pages 427-444. Springer, May / June 2006.
- D. Chaum. Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Advances in Cryptology -CRYPTO'82, pages 199-203. Plenum Press, New York, USA, 1983.
- I. Damgård, N. Fazio, and A. Nicolosi. Non-interactive zero-knowledge from homomorphic encryption. In S. Halevi and T. Rabin, editors, TCC 2006: 3rd Theory of Cryptography Conference, volume 3876 of Lecture Notes in Computer Science, pages 41-59. Springer, Mar. 2006.
- M. Fischlin. Round-optimal composable blind signatures in the common reference string model. In C. Dwork, editor, Advances in Cryptology -CRYPTO 2006, volume 4117 of Lecture Notes in Computer Science, pages 60-77. Springer, Aug. 2006.
- G. Fuchsbauer and D. Pointcheval. Proofs on encrypted values in bilinear groups and an application to anonymity of signatures. In H. Shacham and B. Waters, editors, PAIRING 2009: 3rd International Conference on Pairing-based Cryptography, volume 5671 of Lecture Notes in Computer Science, pages 132-149. Springer, Aug. 2009.
- G. Fuchsbauer. Automorphic signatures in bilinear groups and an application to round-optimal blind signatures. Cryptology ePrint Archive, Report 2009/320, 2009. http://eprint.iacr.org/.
- G. Fuchsbauer. Commuting signatures and verifiable encryption and an application to non-interactively delegatable credentials. Cryptology ePrint Archive, Report 2010/233, 2010. http://eprint.iacr.org/.
- K. Gjøsteen and L. Kråkmo. Round-optimal blind signatures from Waters signatures. In J. Baek, F. Bao, K. Chen, and X. Lai, editors, ProvSec, volume 5324 of Lecture Notes in Computer Science, pages 112-126. Springer, 2008.
- S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2):281-308, Apr. 1988.
- J. Groth and A. Sahai. Efficient non-interactive proof systems for bilinear groups. In N. P. Smart, editor, Advances in Cryptology -EUROCRYPT 2008, volume 4965 of Lecture Notes in Computer Science, pages 415-432. Springer, Apr. 2008.
- D. Hofheinz and E. Kiltz. Programmable hash functions and their applications. In D. Wagner, editor, Advances in Cryptology -CRYPTO 2008, volume 5157 of Lecture Notes in Computer Science, pages 21-38. Springer, Aug. 2008.
- S. Meiklejohn, H. Shacham, and D. M. Freeman. Limitations on transformations from composite-order to prime-order groups: The case of round-optimal blind signatures. In M. Abe, editor, Proceedings of Asiacrypt 2010, volume 6477 of Lecture Notes in Computer Science, pages 519-538. Springer, 2010.
- D. Pointcheval and J. Stern. Provably secure blind signature schemes. In K. Kim and T. Matsumoto, editors, Advances in Cryptology -ASIACRYPT'96, volume 1163 of Lecture Notes in Computer Science, pages 252-265. Springer, Nov. 1996.
- D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3):361-396, 2000.
- R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signature and public-key cryptosystems. Communications of the Association for Computing Machinery, 21(2):120-126, 1978.
- M. Stadler, J.-M. Piveteau, and J. Camenisch. Fair blind signatures. In L. C. Guillou and J.-J. Quisquater, edi- tors, Advances in Cryptology -EUROCRYPT'95, volume 921 of Lecture Notes in Computer Science, pages 209-219. Springer, May 1995.
- B. R. Waters. Efficient identity-based encryption without random oracles. In R. Cramer, editor, Advances in Cryptology -EUROCRYPT 2005, volume 3494 of Lecture Notes in Computer Science, pages 114-127. Springer, May 2005.