Cryptology ePrint Archive: Report 2020/789

Double-Authentication-Preventing Signatures in the Standard Model

Dario Catalano and Georg Fuchsbauer and Azam Soleimanian

Abstract: A double-authentication preventing signature (DAPS) scheme is a digital signature scheme equipped with a self-enforcement mechanism. Messages consist of an address and a payload component, and a signer is penalized if she signs two messages with the same addresses but different payloads. The penalty is the disclosure of the signer's signing key. Most of the existing DAPS schemes are proved secure in the random oracle model (ROM), while the efficient ones in the standard model only support address spaces of polynomial size.

We present DAPS schemes that are efficient, secure in the standard model under standard assumptions and support large address spaces. Our main construction builds on vector commitments (VC) and double-trapdoor chameleon hash functions (DCH). We also provide a DAPS realization from Groth-Sahai (GS) proofs that builds on a generic construction by Derler et al., which they instantiate in the ROM. The GS-based construction, while less efficient than our main one, shows that a general yet efficient instantiation of DAPS in the standard model is possible.

An interesting feature of our main construction is that it can be easily modified to guarantee security even in the most challenging setting where no trusted setup is provided. It seems to be the first construction achieving this in the standard model.

Category / Keywords: cryptographic protocols / Double-spending, digital signature, cryptocurrencies, certificate subversion.

Date: received 25 Jun 2020, last revised 4 Jul 2020

Contact author: azam soleimanian at ens fr

Available format(s): PDF | BibTeX Citation

Note: This is the full version of the paper accepted at SCN 2020

Version: 20200704:142149 (All versions of this report)

Short URL: ia.cr/2020/789


[ Cryptology ePrint archive ]