TY - JOUR
T1 - Tight security for the generic construction of identity-based signature (in the multi-instance setting)
AU - Lee, Youngkyung
AU - Park, Jong Hwan
AU - Lee, Kwangsu
AU - Lee, Dong Hoon
N1 - Funding Information:
This work was supported by the Institute for Information & Communications Technology Promotion (IITP) grant funded by the Korea government ( MSIT ) (grant number 2016-6-00600 , “A Study on Functional Encryption: Construction, Security Analysis, and Implementation”).
PY - 2020/12/22
Y1 - 2020/12/22
N2 - An identity-based signature (IBS) scheme can be generically constructed from any ordinary signature scheme by appending a chain of signatures. Until now, it has been known that a generic construction cannot lead to a tightly secure IBS scheme, although any tightly secure signature scheme can be used as a building block. In this study, we demonstrate that the generic construction of IBS can achieve tightness if the underlying signature scheme is tightly secure in the multi-user setting with corruption. In addition, we extend the tightness result of IBS to the multi-instance setting, where an adversary can corrupt multiple key generation centers and obtain multiple related master secret keys. As instantiations, we adopt the efficient and tightly secure signature scheme in the multi-user setting with corruption, recently proposed by Gjøsteen and Jager (CRYPTO 2018). As a result, we can obtain the first efficient and tightly secure IBS schemes (in the multi-instance setting) based on the Diffie–Hellman assumptions in the random oracle model.
AB - An identity-based signature (IBS) scheme can be generically constructed from any ordinary signature scheme by appending a chain of signatures. Until now, it has been known that a generic construction cannot lead to a tightly secure IBS scheme, although any tightly secure signature scheme can be used as a building block. In this study, we demonstrate that the generic construction of IBS can achieve tightness if the underlying signature scheme is tightly secure in the multi-user setting with corruption. In addition, we extend the tightness result of IBS to the multi-instance setting, where an adversary can corrupt multiple key generation centers and obtain multiple related master secret keys. As instantiations, we adopt the efficient and tightly secure signature scheme in the multi-user setting with corruption, recently proposed by Gjøsteen and Jager (CRYPTO 2018). As a result, we can obtain the first efficient and tightly secure IBS schemes (in the multi-instance setting) based on the Diffie–Hellman assumptions in the random oracle model.
KW - CDH
KW - DDH
KW - Identity-based signature
KW - Multi-instance setting
KW - Random oracle
KW - Tight security
UR - http://www.scopus.com/inward/record.url?scp=85092203724&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85092203724&partnerID=8YFLogxK
U2 - 10.1016/j.tcs.2020.09.044
DO - 10.1016/j.tcs.2020.09.044
M3 - Article
AN - SCOPUS:85092203724
VL - 847
SP - 122
EP - 133
JO - Theoretical Computer Science
JF - Theoretical Computer Science
SN - 0304-3975
ER -