One-Round Strong Oblivious Signature-Based Envelope
2016, Lecture Notes in Computer Science
https://doi.org/10.1007/978-3-319-40367-0_1Abstract
Oblivious Signature-Based Envelope (OSBE) has been widely employed for anonymity-orient and privacypreserving applications. The conventional OSBE execution relies on a secure communication channel to protect against eavesdroppers. In TCC 2012, Blazy, Pointcheval and Vergnaud proposed a framework of OSBE (BPV-OSBE) without requiring any secure channel by clarifying and enhancing the OSBE security notions. They showed how to generically build an OSBE scheme satisfying the new strong security in the standard model with a common-reference string. Their framework requires 2-round interactions and relies on the smooth projective hash function (SPHF) over special languages, i.e., languages from encryption of signatures. In this work, we investigate the study on the strong OSBE and make the following contributions. First, we propose a generic construction of one-round yet strong OSBE system. Compared to the 2-round BPV-OSBE, our one-round construction is more appealing, as its noninteractive setting accommodates more application scenarios in the real word. Moreover, our framework relies on the regular (identity-based) SPHF, which can be instantiated from extensive languages and hence is more general. Second, we also present an efficient instantiation, which is secure under the standard model from classical assumptions, DDH and DBDH, to illustrate the feasibility of our one-round framework. We remark that our construction is the first one-round OSBE with strong security
References (25)
- Abdalla, M., Benhamouda, F., Blazy, O., Chevalier, C., Pointcheval, D.: Sphf-friendly non- interactive commitments. In: ASIACRYPT. pp. 214-234 (2013)
- Abdalla, M., Benhamouda, F., Pointcheval, D.: Disjunctions for hash proof systems: New constructions and applications. In: EUROCRYPT. pp. 69-100 (2015)
- Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth projective hashing for conditionally extractable commitments. In: CRYPTO. pp. 671-689 (2009)
- Alwen, J., Dodis, Y., Naor, M., Segev, G., Walfish, S., Wichs, D.: Public-key encryption in the bounded-retrieval model. In: Advances in Cryptology -EUROCRYPT 2010, 29th An- nual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 -June 3, 2010. Proceedings. pp. 113-134 (2010)
- Benhamouda, F., Blazy, O., Chevalier, C., Pointcheval, D., Vergnaud, D.: New techniques for sphfs and efficient one-round PAKE protocols. In: CRYPTO. pp. 449-475 (2013)
- Blazy, O., Chevalier, C., Vergnaud, D.: Mitigating server breaches in password-based au- thentication: Secure and efficient solutions. In: CT-RSA. pp. 3-18 (2016)
- Blazy, O., Pointcheval, D., Vergnaud, D.: Round-optimal privacy-preserving protocols with smooth projective hash functions. In: TCC. pp. 94-111 (2012)
- Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Advances in Cryptology -CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings. pp. 213-229 (2001)
- Boneh, D., Gentry, C., Hamburg, M.: Space-efficient identity based encryption without pair- ings. In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings. pp. 647-657 (2007)
- Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: A new general framework for secure public key encryption with keyword search. In: ACISP. pp. 59-76 (2015)
- Chen, R., Mu, Y., Yang, G., Susilo, W., Guo, F.: Strongly leakage-resilient authenticated key exchange. In: CT-RSA. pp. 19-36 (2016)
- Chen, Y., Zhang, Z., Lin, D., Cao, Z.: Anonymous identity-based hash proof system and its applications. In: ProvSec. pp. 143-160 (2012)
- Chen, Y., Zhang, Z., Lin, D., Cao, Z.: Identity-based extractable hash proofs and their appli- cations. In: ACNS. pp. 153-170 (2012)
- Chen, Y., Zhang, Z., Lin, D., Cao, Z.: Generalized (identity-based) hash proof system and its applications. IACR Cryptology ePrint Archive 2013, 2 (2013)
- Chen, Y., Zhang, Z., Lin, D., Cao, Z.: Cca-secure IB-KEM from identity-based extractable hash proof system. Comput. J. 57(10), 1537-1556 (2014)
- Chow, S.S.M., Dodis, Y., Rouselakis, Y., Waters, B.: Practical leakage-resilient identity- based encryption from simple assumptions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010. pp. 152-161 (2010)
- Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Cryptog- raphy and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings. pp. 360-363 (2001)
- Coron, J.: A variant of boneh-franklin IBE with a tight reduction in the random oracle model. Des. Codes Cryptography 50(1), 115-133 (2009)
- Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: EUROCRYPT. pp. 45-64 (2002)
- Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. In: EUROCRYPT. pp. 524-543 (2003)
- Gentry, C.: Practical identity-based encryption without random oracles. In: Advances in Cryptology -EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 -June 1, 2006, Proceedings. pp. 445-464 (2006)
- Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th Annual ACM Symposium on Theory of Comput- ing, Victoria, British Columbia, Canada, May 17-20, 2008. pp. 197-206 (2008)
- Halevi, S., Kalai, Y.T.: Smooth projective hashing and two-message oblivious transfer. J. Cryptology 25(1), 158-193 (2012)
- Katz, J., Vaikuntanathan, V.: Round-optimal password-based authenticated key exchange. In: TCC. pp. 293-310 (2011)
- Li, N., Du, W., Boneh, D.: Oblivious signature-based envelope. In: PODC. pp. 182-189 (2003)