CryptoDB
Pairing-Free Blind Signatures from CDH Assumptions
Authors: |
|
---|---|
Download: |
|
Presentation: | Slides |
Conference: | CRYPTO 2024 |
Abstract: | We present the first concurrently-secure blind signatures making black-box use of a pairing-free group for which unforgeability, in the random oracle model, can be proved {\em without} relying on the algebraic group model (AGM), thus resolving a long-standing open question. Prior pairing-free blind signatures without AGM proofs have only been proved secure for bounded concurrency, relied on computationally expensive non-black-box use of NIZKs, or had complexity growing with the number of signing sessions due to the use of boosting techniques. Our most efficient constructions rely on the chosen-target CDH assumption and can be seen as blind versions of signatures by Goh and Jarecki (EUROCRYPT '03) and Chevallier-Mames (CRYPTO '05). We also give a less efficient scheme with security based on (plain) CDH. The underlying signing protocols consist of four (in order to achieve regular unforgeability) or five moves (for strong unforgeability). All schemes are proved statistically blind in the random oracle model. |
BibTeX
@inproceedings{crypto-2024-34220, title={Pairing-Free Blind Signatures from CDH Assumptions}, publisher={Springer-Verlag}, doi={10.1007/978-3-031-68376-3_6}, author={Rutchathon Chairattana-apirom and Stefano Tessaro and Chenzhi Zhu}, year=2024 }