Non-interactive identity-based DNF signature scheme and its extensions

Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee

Research output: Contribution to journalArticle

Abstract

An ID-based DNF signature scheme is an ID-based signature scheme with an access structure which is expressed as a disjunctive normal form (DNF) with literals of signer identities. ID-based DNF signature schemes are useful to achieve not only signer-privacy but also a multi-user access control. In this paper, we formally define a notion of a (non-interactive) ID-based DNF signature and propose the first non- interactive ID-based DNF signature schemes that are secure under the computational Diffie-Hellman and subgroup decision assumptions. Our first scheme uses random oracles, and our second one is designed without random oracles. To construct the second one, we use a novel technique that converts a non-interactive witness indistinguishable proof system of encryption of one bit into a corresponding proof system of encryption of a bit-string. This technique may be of independent interest. The second scheme straightforwardly yields the first ID-based ring signature that achieves anonymity against full key exposure without random oracles. We finally present two extensions of the proposed ID-based DNF signature schemes to support multiple KGCs and different messages.

Original languageEnglish
Pages (from-to)166-183
Number of pages18
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5461
DOIs
Publication statusPublished - 2009 Jun 18

Fingerprint

Identity-based
Signature Scheme
Normal Form
Cryptography
Random Oracle
Access control
Computer systems
Proof System
Encryption
Ring Signature
Access Structure
Diffie-Hellman
Anonymity
Access Control
Privacy
Convert
Signature
Strings
Subgroup

Keywords

  • Access structure
  • Disjunctive normal form
  • Identity-based signature
  • Signer anonymity

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

@article{c4783c7c957c41dcb4c97a5c4bd5add2,
title = "Non-interactive identity-based DNF signature scheme and its extensions",
abstract = "An ID-based DNF signature scheme is an ID-based signature scheme with an access structure which is expressed as a disjunctive normal form (DNF) with literals of signer identities. ID-based DNF signature schemes are useful to achieve not only signer-privacy but also a multi-user access control. In this paper, we formally define a notion of a (non-interactive) ID-based DNF signature and propose the first non- interactive ID-based DNF signature schemes that are secure under the computational Diffie-Hellman and subgroup decision assumptions. Our first scheme uses random oracles, and our second one is designed without random oracles. To construct the second one, we use a novel technique that converts a non-interactive witness indistinguishable proof system of encryption of one bit into a corresponding proof system of encryption of a bit-string. This technique may be of independent interest. The second scheme straightforwardly yields the first ID-based ring signature that achieves anonymity against full key exposure without random oracles. We finally present two extensions of the proposed ID-based DNF signature schemes to support multiple KGCs and different messages.",
keywords = "Access structure, Disjunctive normal form, Identity-based signature, Signer anonymity",
author = "Kwangsu Lee and Hwang, {Jung Yeon} and Lee, {Dong Hoon}",
year = "2009",
month = "6",
day = "18",
doi = "10.1007/978-3-642-00730-9_11",
language = "English",
volume = "5461",
pages = "166--183",
journal = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
issn = "0302-9743",
publisher = "Springer Verlag",

}

TY - JOUR

T1 - Non-interactive identity-based DNF signature scheme and its extensions

AU - Lee, Kwangsu

AU - Hwang, Jung Yeon

AU - Lee, Dong Hoon

PY - 2009/6/18

Y1 - 2009/6/18

N2 - An ID-based DNF signature scheme is an ID-based signature scheme with an access structure which is expressed as a disjunctive normal form (DNF) with literals of signer identities. ID-based DNF signature schemes are useful to achieve not only signer-privacy but also a multi-user access control. In this paper, we formally define a notion of a (non-interactive) ID-based DNF signature and propose the first non- interactive ID-based DNF signature schemes that are secure under the computational Diffie-Hellman and subgroup decision assumptions. Our first scheme uses random oracles, and our second one is designed without random oracles. To construct the second one, we use a novel technique that converts a non-interactive witness indistinguishable proof system of encryption of one bit into a corresponding proof system of encryption of a bit-string. This technique may be of independent interest. The second scheme straightforwardly yields the first ID-based ring signature that achieves anonymity against full key exposure without random oracles. We finally present two extensions of the proposed ID-based DNF signature schemes to support multiple KGCs and different messages.

AB - An ID-based DNF signature scheme is an ID-based signature scheme with an access structure which is expressed as a disjunctive normal form (DNF) with literals of signer identities. ID-based DNF signature schemes are useful to achieve not only signer-privacy but also a multi-user access control. In this paper, we formally define a notion of a (non-interactive) ID-based DNF signature and propose the first non- interactive ID-based DNF signature schemes that are secure under the computational Diffie-Hellman and subgroup decision assumptions. Our first scheme uses random oracles, and our second one is designed without random oracles. To construct the second one, we use a novel technique that converts a non-interactive witness indistinguishable proof system of encryption of one bit into a corresponding proof system of encryption of a bit-string. This technique may be of independent interest. The second scheme straightforwardly yields the first ID-based ring signature that achieves anonymity against full key exposure without random oracles. We finally present two extensions of the proposed ID-based DNF signature schemes to support multiple KGCs and different messages.

KW - Access structure

KW - Disjunctive normal form

KW - Identity-based signature

KW - Signer anonymity

UR - http://www.scopus.com/inward/record.url?scp=67049144703&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=67049144703&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-00730-9_11

DO - 10.1007/978-3-642-00730-9_11

M3 - Article

AN - SCOPUS:67049144703

VL - 5461

SP - 166

EP - 183

JO - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

JF - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SN - 0302-9743

ER -