Loading…

Double-authentication-preventing signatures in the standard model1

A double-authentication preventing signature (DAPS) scheme is a digital signature scheme equipped with a self-enforcement mechanism. Messages consist of an address and a payload component, and a signer is penalized if she signs two messages with the same addresses but different payloads. The penalty...

Full description

Saved in:
Bibliographic Details
Published in:Journal of computer security 2022-01, Vol.30 (1), p.3-38
Main Authors: Catalano, Dario, Fuchsbauer, Georg, Soleimanian, Azam
Format: Article
Language:English
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c767-a9cb9f20427dd940acfcf9e94eb28187615b1378640e395d65092271381ede243
cites cdi_FETCH-LOGICAL-c767-a9cb9f20427dd940acfcf9e94eb28187615b1378640e395d65092271381ede243
container_end_page 38
container_issue 1
container_start_page 3
container_title Journal of computer security
container_volume 30
creator Catalano, Dario
Fuchsbauer, Georg
Soleimanian, Azam
description A double-authentication preventing signature (DAPS) scheme is a digital signature scheme equipped with a self-enforcement mechanism. Messages consist of an address and a payload component, and a signer is penalized if she signs two messages with the same addresses but different payloads. The penalty is the disclosure of the signer’s signing key. Most of the existing DAPS schemes are proved secure in the random oracle model (ROM), while the efficient ones in the standard model only support address spaces of polynomial size. We present DAPS schemes that are efficient, secure in the standard model under standard assumptions and support large address spaces. Our main construction builds on vector commitments (VC) and double-trapdoor chameleon hash functions (DCH). We also provide a DAPS realization from Groth–Sahai (GS) proofs that builds on a generic construction by Derler et al., which they instantiate in the ROM. The GS-based construction, while less efficient than our main one, shows that a general yet efficient instantiation of DAPS in the standard model is possible. An interesting feature of our main construction is that it can be easily modified to guarantee security even in the most challenging setting where no trusted setup is provided. To the best of our knowledge, ours seems to be the first construction achieving this in the standard model.
doi_str_mv 10.3233/JCS-200117
format article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_3233_JCS_200117</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_3233_JCS_200117</sourcerecordid><originalsourceid>FETCH-LOGICAL-c767-a9cb9f20427dd940acfcf9e94eb28187615b1378640e395d65092271381ede243</originalsourceid><addsrcrecordid>eNotj01LxDAURYMoWEc3_oKuhWjeS9o0Sx0dPxhw4SzclTR5HSuddEhawX9vh3F1uXC5nMPYNYhbiVLevS0_OAoBoE9YBpUueGVQnbJMGCw5ov48ZxcpfQuBAKbK2MPjMDU9cTuNXxTGztmxGwLfR_o51LDNU7cNdpwipbwL-bzK02iDt9Hnu8FTD5fsrLV9oqv_XLDN6mmzfOHr9-fX5f2aO11qbo1rTItCofbeKGFd61pDRlGD1UxaQtGA1FWpBElT-LKYkVGDrIA8oZILdnO8dXFIKVJb72O3s_G3BlEf5OtZvj7Kyz-yEkw_</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Double-authentication-preventing signatures in the standard model1</title><source>EBSCOhost Business Source Ultimate</source><creator>Catalano, Dario ; Fuchsbauer, Georg ; Soleimanian, Azam</creator><contributor>Galdi, Clemente ; Kolesnikov, Vladimir</contributor><creatorcontrib>Catalano, Dario ; Fuchsbauer, Georg ; Soleimanian, Azam ; Galdi, Clemente ; Kolesnikov, Vladimir</creatorcontrib><description>A double-authentication preventing signature (DAPS) scheme is a digital signature scheme equipped with a self-enforcement mechanism. Messages consist of an address and a payload component, and a signer is penalized if she signs two messages with the same addresses but different payloads. The penalty is the disclosure of the signer’s signing key. Most of the existing DAPS schemes are proved secure in the random oracle model (ROM), while the efficient ones in the standard model only support address spaces of polynomial size. We present DAPS schemes that are efficient, secure in the standard model under standard assumptions and support large address spaces. Our main construction builds on vector commitments (VC) and double-trapdoor chameleon hash functions (DCH). We also provide a DAPS realization from Groth–Sahai (GS) proofs that builds on a generic construction by Derler et al., which they instantiate in the ROM. The GS-based construction, while less efficient than our main one, shows that a general yet efficient instantiation of DAPS in the standard model is possible. An interesting feature of our main construction is that it can be easily modified to guarantee security even in the most challenging setting where no trusted setup is provided. To the best of our knowledge, ours seems to be the first construction achieving this in the standard model.</description><identifier>ISSN: 0926-227X</identifier><identifier>EISSN: 1875-8924</identifier><identifier>DOI: 10.3233/JCS-200117</identifier><language>eng</language><ispartof>Journal of computer security, 2022-01, Vol.30 (1), p.3-38</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c767-a9cb9f20427dd940acfcf9e94eb28187615b1378640e395d65092271381ede243</citedby><cites>FETCH-LOGICAL-c767-a9cb9f20427dd940acfcf9e94eb28187615b1378640e395d65092271381ede243</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Galdi, Clemente</contributor><contributor>Kolesnikov, Vladimir</contributor><creatorcontrib>Catalano, Dario</creatorcontrib><creatorcontrib>Fuchsbauer, Georg</creatorcontrib><creatorcontrib>Soleimanian, Azam</creatorcontrib><title>Double-authentication-preventing signatures in the standard model1</title><title>Journal of computer security</title><description>A double-authentication preventing signature (DAPS) scheme is a digital signature scheme equipped with a self-enforcement mechanism. Messages consist of an address and a payload component, and a signer is penalized if she signs two messages with the same addresses but different payloads. The penalty is the disclosure of the signer’s signing key. Most of the existing DAPS schemes are proved secure in the random oracle model (ROM), while the efficient ones in the standard model only support address spaces of polynomial size. We present DAPS schemes that are efficient, secure in the standard model under standard assumptions and support large address spaces. Our main construction builds on vector commitments (VC) and double-trapdoor chameleon hash functions (DCH). We also provide a DAPS realization from Groth–Sahai (GS) proofs that builds on a generic construction by Derler et al., which they instantiate in the ROM. The GS-based construction, while less efficient than our main one, shows that a general yet efficient instantiation of DAPS in the standard model is possible. An interesting feature of our main construction is that it can be easily modified to guarantee security even in the most challenging setting where no trusted setup is provided. To the best of our knowledge, ours seems to be the first construction achieving this in the standard model.</description><issn>0926-227X</issn><issn>1875-8924</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNotj01LxDAURYMoWEc3_oKuhWjeS9o0Sx0dPxhw4SzclTR5HSuddEhawX9vh3F1uXC5nMPYNYhbiVLevS0_OAoBoE9YBpUueGVQnbJMGCw5ov48ZxcpfQuBAKbK2MPjMDU9cTuNXxTGztmxGwLfR_o51LDNU7cNdpwipbwL-bzK02iDt9Hnu8FTD5fsrLV9oqv_XLDN6mmzfOHr9-fX5f2aO11qbo1rTItCofbeKGFd61pDRlGD1UxaQtGA1FWpBElT-LKYkVGDrIA8oZILdnO8dXFIKVJb72O3s_G3BlEf5OtZvj7Kyz-yEkw_</recordid><startdate>20220120</startdate><enddate>20220120</enddate><creator>Catalano, Dario</creator><creator>Fuchsbauer, Georg</creator><creator>Soleimanian, Azam</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20220120</creationdate><title>Double-authentication-preventing signatures in the standard model1</title><author>Catalano, Dario ; Fuchsbauer, Georg ; Soleimanian, Azam</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c767-a9cb9f20427dd940acfcf9e94eb28187615b1378640e395d65092271381ede243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Catalano, Dario</creatorcontrib><creatorcontrib>Fuchsbauer, Georg</creatorcontrib><creatorcontrib>Soleimanian, Azam</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of computer security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Catalano, Dario</au><au>Fuchsbauer, Georg</au><au>Soleimanian, Azam</au><au>Galdi, Clemente</au><au>Kolesnikov, Vladimir</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Double-authentication-preventing signatures in the standard model1</atitle><jtitle>Journal of computer security</jtitle><date>2022-01-20</date><risdate>2022</risdate><volume>30</volume><issue>1</issue><spage>3</spage><epage>38</epage><pages>3-38</pages><issn>0926-227X</issn><eissn>1875-8924</eissn><abstract>A double-authentication preventing signature (DAPS) scheme is a digital signature scheme equipped with a self-enforcement mechanism. Messages consist of an address and a payload component, and a signer is penalized if she signs two messages with the same addresses but different payloads. The penalty is the disclosure of the signer’s signing key. Most of the existing DAPS schemes are proved secure in the random oracle model (ROM), while the efficient ones in the standard model only support address spaces of polynomial size. We present DAPS schemes that are efficient, secure in the standard model under standard assumptions and support large address spaces. Our main construction builds on vector commitments (VC) and double-trapdoor chameleon hash functions (DCH). We also provide a DAPS realization from Groth–Sahai (GS) proofs that builds on a generic construction by Derler et al., which they instantiate in the ROM. The GS-based construction, while less efficient than our main one, shows that a general yet efficient instantiation of DAPS in the standard model is possible. An interesting feature of our main construction is that it can be easily modified to guarantee security even in the most challenging setting where no trusted setup is provided. To the best of our knowledge, ours seems to be the first construction achieving this in the standard model.</abstract><doi>10.3233/JCS-200117</doi><tpages>36</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0926-227X
ispartof Journal of computer security, 2022-01, Vol.30 (1), p.3-38
issn 0926-227X
1875-8924
language eng
recordid cdi_crossref_primary_10_3233_JCS_200117
source EBSCOhost Business Source Ultimate
title Double-authentication-preventing signatures in the standard model1
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T16%3A50%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Double-authentication-preventing%20signatures%20in%20the%20standard%20model1&rft.jtitle=Journal%20of%20computer%20security&rft.au=Catalano,%20Dario&rft.date=2022-01-20&rft.volume=30&rft.issue=1&rft.spage=3&rft.epage=38&rft.pages=3-38&rft.issn=0926-227X&rft.eissn=1875-8924&rft_id=info:doi/10.3233/JCS-200117&rft_dat=%3Ccrossref%3E10_3233_JCS_200117%3C/crossref%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c767-a9cb9f20427dd940acfcf9e94eb28187615b1378640e395d65092271381ede243%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true