Paper 2018/738

Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature

Sanjit Chatterjee and R. Kabaleeshwaran

Abstract

A large number of parameterized complexity assumptions have been introduced in the bilinear pairing setting to design novel cryptosystems and an important question is whether such ``$q$-type" assumptions can be replaced by some static one. Recently Ghadafi and Groth captured several such parameterized assumptions in the pairing setting in a family called bilinear target assumption (BTA). We apply the DéjàQ techniques for all $q$-type assumptions in the BTA family. In this process, first we formalize the notion of extended adaptive parameter-hiding property and use it in the Chase-Meiklejohn's DéjàQ framework to reduce those $q$-type assumptions from subgroup hiding assumption in the asymmetric composite-order pairing. In addition, we extend the BTA family further into BTA1 and BTA2 and study the relation between different BTA variants. We also discuss the inapplicability of DéjàQ techniques on the $q$-type assumptions that belong to BTA1 or BTA2 family. We then provide one further application of Gerbush et al's dual-form signature techniques to remove the dependence on a $q$-type assumption for which existing DéjàQ techniques are not applicable. This results in a variant of Abe et al's structure-preserving signature with security based on a static assumption in composite order setting.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Major revision. ProvSec 2018
Keywords
Bilinear target assumptionq-type assumption
Contact author(s)
kabaleeshwar @ iisc ac in
History
2018-08-15: received
Short URL
https://ia.cr/2018/738
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/738,
      author = {Sanjit Chatterjee and R.  Kabaleeshwaran},
      title = {Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of {DéjàQ} and Dual-Form Signature},
      howpublished = {Cryptology {ePrint} Archive, Paper 2018/738},
      year = {2018},
      url = {https://eprint.iacr.org/2018/738}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.