TY - JOUR
T1 - Generic construction for tightly-secure signatures from discrete log
AU - Lai, Jianchang
AU - Wu, Ge
AU - Jiang, Peng
AU - Zhao, Zhen
AU - Susilo, Willy
AU - Guo, Fuchun
N1 - Publisher Copyright:
© 2021 Elsevier B.V.
PY - 2021/10/4
Y1 - 2021/10/4
N2 - Tightly secure signature plays a significant role in the research of cryptography and has been studied extensively in the literature. In this paper, we present a generic construction for tightly-secure signatures from the discrete log (DL) assumption in the existential-unforgeability against key only attacks (EUF-KOA) security model, where the adversary is allowed to obtain only the public key, but not any sample signature. Moreover, the generic construction can also be extended into the multi-user setting with corruptions (MU-C) model. Roughly speaking, given any signature scheme, we can efficiently convert it into a signature scheme that features tight security under the DL assumption in the MU-EUF-KOA-C security model with random oracles. Our transformation shows it is easy to construct a DL-equivalent signature in the EUF-KOA security model, although many known DL-based signatures are not equivalent to DL. If the given signature scheme is key-re-randomizable, the transformed scheme is also key-re-randomizable. Hence, our result provides a supplement to Bader et al.'s work (EUROCRYPT 2016).
AB - Tightly secure signature plays a significant role in the research of cryptography and has been studied extensively in the literature. In this paper, we present a generic construction for tightly-secure signatures from the discrete log (DL) assumption in the existential-unforgeability against key only attacks (EUF-KOA) security model, where the adversary is allowed to obtain only the public key, but not any sample signature. Moreover, the generic construction can also be extended into the multi-user setting with corruptions (MU-C) model. Roughly speaking, given any signature scheme, we can efficiently convert it into a signature scheme that features tight security under the DL assumption in the MU-EUF-KOA-C security model with random oracles. Our transformation shows it is easy to construct a DL-equivalent signature in the EUF-KOA security model, although many known DL-based signatures are not equivalent to DL. If the given signature scheme is key-re-randomizable, the transformed scheme is also key-re-randomizable. Hence, our result provides a supplement to Bader et al.'s work (EUROCRYPT 2016).
KW - Discrete log
KW - Generic construction
KW - Tightly-secure signature
UR - http://www.scopus.com/inward/record.url?scp=85112203445&partnerID=8YFLogxK
U2 - 10.1016/j.tcs.2021.07.014
DO - 10.1016/j.tcs.2021.07.014
M3 - Article
AN - SCOPUS:85112203445
SN - 0304-3975
VL - 888
SP - 13
EP - 21
JO - Theoretical Computer Science
JF - Theoretical Computer Science
ER -