Paper 2023/1780
Pairing-Free Blind Signatures from CDH Assumptions
Abstract
We present the first concurrently-secure blind signatures making black-box use of a pairing-free group for which unforgeability, in the random oracle model, can be proved {\em without} relying on the algebraic group model (AGM), thus resolving a long-standing open question. Prior pairing-free blind signatures without AGM proofs have only been proved secure for bounded concurrency or relied on computationally expensive non-black-box use of NIZKs. Our most efficient constructions rely on the chosen-target CDH assumption and can be seen as blind versions of signatures by Goh and Jarecki (EUROCRYPT '03) and Chevallier-Mames (CRYPTO '05). We also give a less efficient scheme with security based on (plain) CDH. The underlying signing protocols consist of four (in order to achieve regular unforgeability) or five moves (for strong unforgeability). All schemes are proved statistically blind in the random oracle model.
Note: The construction from CDH in the previous version is modified to achieve a stronger (and more common) one-more unforgeability notion.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Preprint.
- Keywords
- Blind SignaturesCDH Assumption
- Contact author(s)
-
rchairat @ cs washington edu
tessaro @ cs washington edu
zhucz20 @ cs washington edu - History
- 2024-03-05: revised
- 2023-11-17: received
- See all versions
- Short URL
- https://ia.cr/2023/1780
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/1780, author = {Rutchathon Chairattana-Apirom and Stefano Tessaro and Chenzhi Zhu}, title = {Pairing-Free Blind Signatures from CDH Assumptions}, howpublished = {Cryptology ePrint Archive, Paper 2023/1780}, year = {2023}, note = {\url{https://eprint.iacr.org/2023/1780}}, url = {https://eprint.iacr.org/2023/1780} }