Cryptology ePrint Archive: Report 2018/790

Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation

David Derler and Sebastian Ramacher and Daniel Slamanig

Abstract: Double-authentication preventing signatures (DAPS) are a variant of digital signatures which have received considerable attention recently (Derler et al. EuroS&P 2018, Poettering AfricaCrypt 2018). They are unforgeable signatures in the usual sense and sign messages that are composed of an address and a payload. Their distinguishing feature is the property that signing two different payloads with respect to the same address allows to publicly extract the secret signing key from two such signatures.

DAPS are known in the factoring, the discrete logarithm and the lattice setting. The majority of the constructions are ad-hoc. Only recently, Derler et al. (EuroS&P 2018) presented the first generic construction that allows to extend any discrete logarithm based secure signatures scheme to DAPS. However, their scheme has the drawback that the number of potential addresses (the address space) used for signing is polynomially bounded (and in fact small) as the size of secret and the public keys of the resulting DAPS are linear in the address space. In this paper we overcome this limitation and present a generic construction of DAPS with constant size keys and signatures. Our techniques are not tailored to a specific algebraic setting and in particular allow us to construct the first DAPS without structured hardness assumptions, i.e., from symmetric key primitives, yielding a candidate for post-quantum secure DAPS.

Category / Keywords: public-key cryptography / digital signatures, double-authentication prevention, Shamir secret sharing, provable-security, generic construction, exponential size address space

Original Publication (with major differences): ProvSec 2018

Date: received 28 Aug 2018

Contact author: sebastian ramacher at iaik tugraz at

Available format(s): PDF | BibTeX Citation

Version: 20180901:024521 (All versions of this report)

Short URL: ia.cr/2018/790


[ Cryptology ePrint archive ]