Cryptology ePrint Archive: Report 2020/135

Threshold Ring Signatures: New Definitions and Post-Quantum Security

Abida Haque and Alessandra Scafuro

Abstract: A $t$-out-of-$N$ threshold ring signature allows $t$ parties to jointly and anonymously compute a signature on behalf on $N$ public keys, selected in an arbitrary manner among the set of all public keys registered in the system.

Existing definitions for $t$-out-of-$N$ threshold ring signatures guarantee security only when the public keys are honestly generated, and many even restrict the ability of the adversary to actively participate in the computation of the signatures. Such definitions do not capture the open settings envisioned for threshold ring signatures, where parties can independently add themselves to the system, and join other parties for the computation of the signature.

Furthermore, known constructions of threshold ring signatures are not provably secure in the post-quantum setting, either because they are based on non-post quantum secure problems (e.g. Discrete Log, RSA), or because they rely on transformations such as Fiat-Shamir, that are not always secure in the quantum random oracle model (QROM).

In this paper, we provide the first definition of $t$-out-of-$N$ threshold ring signatures against {\em active} adversaries who can participate in the system and arbitrarily deviate from the prescribed procedures. Second, we present a post-quantum secure realization based on {\em any} (post-quantum secure) trapdoor commitment, which we prove secure in the QROM. Our construction is black-box and it can be instantiated with any trapdoor commitment, thus allowing the use of a variety of hardness assumptions.

Category / Keywords: cryptographic protocols / Threshold Ring Signatures, QROM, post-quantum cryptography

Original Publication (with major differences): IACR-PKC-2020

Date: received 7 Feb 2020

Contact author: ahaque3 at ncsu edu,ascafur@ncsu edu

Available format(s): PDF | BibTeX Citation

Version: 20200210:173842 (All versions of this report)

Short URL: ia.cr/2020/135


[ Cryptology ePrint archive ]