Cryptology ePrint Archive: Report 2012/576

Concurrent Signature without Random Oracles

Xiao Tan and Qiong Huang and Duncan S. Wong

Abstract: Concurrent signatures provide a way to exchange digital signature among parties in an efficient and fair manner. To the best of our knowledge, all the existing solutions can only be proven secure in the random oracle model. How to build an efficient concurrent signature scheme in the standard model has remained as an open problem since its introduction in 2004. In this paper we answer the problem affirmatively. Base on a novel idea, we propose a new concurrent signature construction, the security of which does not rely on the random oracle assumption. Our idea stems from an attempt of achieving a strong ambiguity feature that anyone should be able to produce indistinguishable ambiguous signatures by just using public information available in the system. In the multi-user setting, we prove the security of the new scheme based on Computational Diffie-Hellman (CDH) assumption, which is a rather standard and well-studied assumption in cryptography.

Category / Keywords: fair exchange, concurrent signature, ambiguity, multi-user setting

Date: received 9 Oct 2012, last revised 23 Oct 2012

Contact author: xiaotan4 at gapps cityu edu hk

Available format(s): PDF | BibTeX Citation

Version: 20121024:052542 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]