Skip to main content

2018 | OriginalPaper | Buchkapitel

Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature (Extended Abstract)

verfasst von : Sanjit Chatterjee, R. Kabaleeshwaran

Erschienen in: Provable Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A large number of parameterized complexity assumptions have been introduced in the bilinear pairing setting to design novel cryptosystems and an important question is whether such “q-type” assumptions can be replaced by some static one. Recently Ghadafi and Groth captured several such parameterized assumptions in the pairing setting in a family called bilinear target assumption (BTA). We apply the DéjàQ techniques for all q-type assumptions in the BTA family. In this process, first we formalize the notion of extended adaptive parameter-hiding property and use it in the Chase-Meiklejohn’s DéjàQ framework to reduce those q-type assumptions from subgroup hiding assumption in the asymmetric composite-order pairing. In addition, we extend the BTA family further into BTA1 and BTA2 and study the relation between different BTA variants. We also discuss the inapplicability of DéjàQ techniques on the q-type assumptions that belong to BTA1 or BTA2 family. We then provide one further application of Gerbush et al.’s dual-form signature techniques to remove the dependence on a q-type assumption for which existing DéjàQ techniques are not applicable. This results in a variant of Abe et al.’s structure-preserving signature with security based on a static assumption in composite order setting.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
For BTA in \(\mathbb G_T\), the degree of the challenge term polynomials are bounded by 2d, as given the d degree polynomials in both source groups, one can use the pairing to compute the product of these polynomials in \(\mathbb G_T\).
 
2
We say that the BTA assumption defined in the asymmetric pairing setting is one-sided, if the secret vector \(\mathbf {x}\) associated with the polynomial representation occurs in exactly one of the source groups. Otherwise we say that the assumption is two-sided.
 
3
Even if \(N=p_1\ldots p_n\), we decompose G using two of its subgroups \(G_1\) and \(G_2\) such that \(G_1\) (resp. \(G_2\)) is a subgroup of order \(p_1\ldots p_{n-1}\) (resp. \(p_n\)).
 
4
As similar to BTA assumption, hardness of Assumption 4 ensures that the instance and challenge terms should satisfy certain linearly independent condition that corresponds to Eq. 1. However we directly prove the hardness of Assumption 4 in Corollary 1. This guarantees that the above condition automatically satisfies and hence we do not need to explicitly state such condition here.
 
5
First we check A (resp. D) belongs to G (resp. H) by verifying \(A^N=1_{G}\) (resp. \(D^N=1_{H}\)). Then the pairing equation \(e(A, D)=e(g_1, h_1)\) ensures that D indeed belongs to subgroup \(H_1\).
 
Literatur
13.
Zurück zum Zitat Chatterjee, S., Kabaleeshwaran, R.: Towards static assumption based cryptosystem in pairing setting: further applications of DéjàQ and dual-form signature. IACR Cryptology ePrint Archive 2018/738 (2018) Chatterjee, S., Kabaleeshwaran, R.: Towards static assumption based cryptosystem in pairing setting: further applications of DéjàQ and dual-form signature. IACR Cryptology ePrint Archive 2018/738 (2018)
14.
Zurück zum Zitat Chatterjee, S., Menezes, A.: On cryptographic protocols employing asymmetric pairings - the role of \(\Psi \) revisited. Discrete Appl. Math. 159(13), 1311–1322 (2011)MathSciNetCrossRef Chatterjee, S., Menezes, A.: On cryptographic protocols employing asymmetric pairings - the role of \(\Psi \) revisited. Discrete Appl. Math. 159(13), 1311–1322 (2011)MathSciNetCrossRef
16.
Zurück zum Zitat Fuchsbauer, G.: Automorphic signatures in bilinear groups and an application to round-optimal blind signatures. IACR Cryptology ePrint Archive 2009/320 (2009) Fuchsbauer, G.: Automorphic signatures in bilinear groups and an application to round-optimal blind signatures. IACR Cryptology ePrint Archive 2009/320 (2009)
17.
Zurück zum Zitat Fuchsbauer, G., Hanser, C., Slamanig, D.: Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. IACR Cryptology ePrint Archive 2014/944 (2014) Fuchsbauer, G., Hanser, C., Slamanig, D.: Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. IACR Cryptology ePrint Archive 2014/944 (2014)
26.
Zurück zum Zitat Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85(2), 481–484 (2002) Mitsunari, S., Sakai, R., Kasahara, M.: A new traitor tracing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85(2), 481–484 (2002)
28.
Zurück zum Zitat Okamoto, T.: Efficient blind and partially blind signatures without random oracles. IACR Cryptology ePrint Archive 2006/102 (2006) Okamoto, T.: Efficient blind and partially blind signatures without random oracles. IACR Cryptology ePrint Archive 2006/102 (2006)
29.
Zurück zum Zitat Wee, H.: Déjà Q: encore! Un petit IBE. IACR Cryptology ePrint Archive 2015/1064 (2015) Wee, H.: Déjà Q: encore! Un petit IBE. IACR Cryptology ePrint Archive 2015/1064 (2015)
Metadaten
Titel
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature (Extended Abstract)
verfasst von
Sanjit Chatterjee
R. Kabaleeshwaran
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-01446-9_13