Paper 2019/1452

Leakage-Resilient Lattice-Based Partially Blind Signatures

D. Papachristoudis, D. Hristu-Varsakelis, F. Baldimtsi, and G. Stephanides

Abstract

Blind signature schemes (BSS) play a pivotal role in privacy-oriented cryptography. However, with blind signature schemes, the signed message remains unintelligible to the signer, giving them no guarantee that the blinded message he signed actually contained valid information. Partially-blind signature schemes (PBSS) were introduced to address precisely this problem. In this paper we present the first leakage-resilient, lattice-based partially-blind signature scheme in the literature. Our construction is provably secure in the random oracle model (ROM) and offers quasilinear complexity w.r.t. key/signature sizes and signing speed. In addition, it offers statistical partial blindness and its unforgeability is based on the computational hardness of worst-case ideal lattice problems for approximation factors in $˜ O(n^4)$ in dimension $n$. Our scheme benefits from the subexponential hardness of ideal lattice problems and remains secure even if a (1-o(1)) fraction of the signer’s secret key leaks to an adversary via arbitrary side-channels. Several extensions of the security model, such as honest-user unforgeability and selective failure blindness, are also considered and concrete parameters for instantiation are proposed.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. IET Information Security
DOI
10.1049/iet-ifs.2019.0156
Keywords
Post-Quantum CryptographyLatticesPartially-blind signaturesPrivacy-preserving applicationsAnonymity
Contact author(s)
dpapachristoudis @ uom edu gr
History
2019-12-16: received
Short URL
https://ia.cr/2019/1452
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/1452,
      author = {D.  Papachristoudis and D.  Hristu-Varsakelis and F.  Baldimtsi and G.  Stephanides},
      title = {Leakage-Resilient Lattice-Based Partially Blind Signatures},
      howpublished = {Cryptology {ePrint} Archive, Paper 2019/1452},
      year = {2019},
      doi = {10.1049/iet-ifs.2019.0156},
      url = {https://eprint.iacr.org/2019/1452}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.