Skip to main content

2018 | OriginalPaper | Buchkapitel

Forward-Secure Linkable Ring Signatures

verfasst von : Xavier Boyen, Thomas Haines

Erschienen in: Information Security and Privacy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct applications in elegantly addressing a number of simultaneous constraints in remote electronic voting. We propose a comprehensive security model, and construct a scheme based on the hardness of finding discrete logarithms, and (for forward security) inverting bilinear or multilinear maps of moderate degree to match the time granularity of forward security. We prove efficient security reductions—which, of independent interest, apply to, and are much tighter than, linkable ring signatures without forward security, thereby vastly improving the provable security of these legacy schemes. If efficient multilinear maps should ever admit a secure realisation, our contribution would elegantly address a number of problems heretofore unsolved in the important application of (multi-election) practical internet voting. Even if multilinear maps never obtain, our minimal two-epoch construction instantiated from bilinear maps can be combinatorially boosted to synthesize a polynomial time granularity, which would be sufficient for internet voting and more.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The original linkable ring signatures of Liu et al. [18, 19] had proofs with losses exponential in the number of users, due to nested use of the forking lemma [23] on Pedersen commitments [22] in the random-oracle model. Our updated proofs and reductions are independent of the number of users, thanks to a single consolidated use of the forking lemma; and the same techniques directly apply to their construction.
 
2
In the UK there is a requirement that a judge be able to order a voter’s ballot revealed. Group signatures would be perfect for such subtle voter intimidation, though Continentals would of course disapprove.
 
3
In its standardasised version [2], Helios relies on a mixnet technique to distribute the election authority’s ability to deanonymise. Even for Helios implementations that use this technique, the ability to enforce anonymity in the authentication mechanism itself would provide stronger privacy guarantees.
 
4
Rate limitation in the context of authentication refers to an intentional bound on the number of uses, typically one, that can be made of a credential on a given target.
 
5
Our definations are fairly direct forward secure variants of Liu et al. [18].
 
6
The last two aspects are generalisations of the first two. We present them all because the standard variants use weaker assumptions than the forward-secure variants.
 
7
While it is possible for two different private keys to have the same public key, violating the assertion above, this would also break the Pedersen commitments and reveal the relationship between g and h. It is also possible for the hash function to collide. These events are assumed of negligible probability.
 
Literatur
1.
Zurück zum Zitat Adida, B.: Helios: web-based open-audit voting. In: USENIX Security (2008) Adida, B.: Helios: web-based open-audit voting. In: USENIX Security (2008)
2.
Zurück zum Zitat Adida, B.: Helios v3 verification specs. Technical report, Helios Voting (2010) Adida, B.: Helios v3 verification specs. Technical report, Helios Voting (2010)
4.
Zurück zum Zitat Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. J. ACM 59(2), 6 (2012)MathSciNetCrossRefMATH Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. J. ACM 59(2), 6 (2012)MathSciNetCrossRefMATH
6.
Zurück zum Zitat Boneh, D., Wu, D.J., Zimmerman, J.: Immunizing multilinear maps against zeroizing attacks. IACR Cryptol. ePrint Archive 2014, 930 (2014) Boneh, D., Wu, D.J., Zimmerman, J.: Immunizing multilinear maps against zeroizing attacks. IACR Cryptol. ePrint Archive 2014, 930 (2014)
9.
Zurück zum Zitat Cheon, J.H., Jeong, J., Lee, C.: An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low level encoding of zero. IACR Cryptol. ePrint Archive 19, 255–266 (2016)MathSciNetMATH Cheon, J.H., Jeong, J., Lee, C.: An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low level encoding of zero. IACR Cryptol. ePrint Archive 19, 255–266 (2016)MathSciNetMATH
12.
Zurück zum Zitat Demirel, D., Van De Graaf, J., Araújo, R.: Improving helios with everlasting privacy towards the public. In: Proceedings of eVOTE/Trustworthy Elections. USENIX (2012) Demirel, D., Van De Graaf, J., Araújo, R.: Improving helios with everlasting privacy towards the public. In: Proceedings of eVOTE/Trustworthy Elections. USENIX (2012)
18.
Zurück zum Zitat Liu, J.K., Au, M.H., Susilo, W., Zhou, J.: Linkable ring signature with unconditional anonymity. IEEE Trans. Knowl. Data Eng. 26(1), 157–165 (2014)CrossRef Liu, J.K., Au, M.H., Susilo, W., Zhou, J.: Linkable ring signature with unconditional anonymity. IEEE Trans. Knowl. Data Eng. 26(1), 157–165 (2014)CrossRef
21.
Zurück zum Zitat Paneth, O., Sahai, A.: On the equivalence of obfuscation and multilinear maps. IACR Cryptol. ePrint Archive 2015, 791 (2015) Paneth, O., Sahai, A.: On the equivalence of obfuscation and multilinear maps. IACR Cryptol. ePrint Archive 2015, 791 (2015)
25.
Zurück zum Zitat Tsoukalas, G., Papadimitriou, K., Louridas, P., Tsanakas, P.: From helios to zeus. USENIX J. Elect. Technol. Syst. (JETS) 1, 1–17 (2013) Tsoukalas, G., Papadimitriou, K., Louridas, P., Tsanakas, P.: From helios to zeus. USENIX J. Elect. Technol. Syst. (JETS) 1, 1–17 (2013)
26.
Zurück zum Zitat Zhandry, M.: Adaptively secure broadcast encryption with small system parameters. IACR Cryptol. ePrint Archive 2014, 757 (2014) Zhandry, M.: Adaptively secure broadcast encryption with small system parameters. IACR Cryptol. ePrint Archive 2014, 757 (2014)
Metadaten
Titel
Forward-Secure Linkable Ring Signatures
verfasst von
Xavier Boyen
Thomas Haines
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-93638-3_15

Premium Partner