Download presentation
Presentation is loading. Please wait.
Published byThomasina Wilkerson Modified over 9 years ago
1
IAW 2006 Cascaded Authorization with Anonymous- Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with Roberto Tamassia NSF grants CCF–0311510, CNS–0303577 and IIS–0324846
2
Outline Motivation for anonymity and aggregation Construction of Anonymous-Signer Aggregate Signature Scheme Security properties of the scheme Applications
3
Digital credential Digital credential is signed by the issuer with a digital signature scheme To certify the credential holder To certify the credential holder Digital signature scheme Signing uses the private key Signing uses the private key Verification uses the public key Verification uses the public key Bob is a university Bob is a universityprofessor Public key Private key Bob University’s signature Public key Private key Bob’s credential University The credential can be verified against university’s public key
4
Motivation: Anonymous authorization Bank Group signature schemes [Chaum van Heijst 91, Ateniese Camenisch Joye Tsudik 00, Boneh Boyen Shacham 04, Camenisch Lysyanskaya 04] [Chaum van Heijst 91, Ateniese Camenisch Joye Tsudik 00, Boneh Boyen Shacham 04, Camenisch Lysyanskaya 04] Support anonymity Support anonymity Bank cashiers 2. Request to sign Cashier’s check 1. Certify membership 3. Authorization
5
Motivation: Aggergation 1. Request 2. Authorization 3. Authorization 4. Authorization [Boneh Gentry Shacham Lynn 03]
6
Our goal: Aggregate anonymous signatures Signing anonymity Signature aggregation Aggregate Signature Delegation Signatures Aggregate
7
Anonymous authorization chain 1. Request 2. Authorization 3. Authorization 4. Authorization
8
Anonymous-signer aggregate signature scheme Properties Aggregation: Bob’s signature can be added with Alice’s Aggregation: Bob’s signature can be added with Alice’s Anonymity: No one can tell that a signature is from Bob Anonymity: No one can tell that a signature is from Bob Unlinkability: No one can tell that two signatures are from Bob Unlinkability: No one can tell that two signatures are from Bob Non-framing: Alice cannot sign on behalf of Bob Non-framing: Alice cannot sign on behalf of Bob Traceability: Bob’s boss can find out that Bob is the signer Traceability: Bob’s boss can find out that Bob is the signer Existing signature schemes do not satisfy all the requirements Aggregate signature scheme Aggregate signature scheme Group signature scheme Group signature scheme Challenge: extending existing schemes is non-trivial
9
Aggregate signature scheme Aggregate signature scheme [Boneh Gentry Shacham Lynn 03] The size of signatures and public keys 170 bits with security comparable to 1024 bit RSA and 320 bit DSA schemes The size of signatures and public keys 170 bits with security comparable to 1024 bit RSA and 320 bit DSA schemes Verification is linear in the number of individual signatures Bob PK 1,SK 1 PK 1,SK 1 Alice PK 2,SK 2 PK 3,SK 3 Sign m 1 Sign m 1 S1S1S1S1 Sign m 2 Sign m 2 S2S2S2S2 S3S3S3S3 Bob aggregates + + = How to make the aggregate signature scheme support anonymity? Sign m 3 Sign m 3 Eve S2S2S2S2 S1S1S1S1 S3S3S3S3 SASASASA
10
An attempt to support anonymity using the existing aggregate signatures Signers sign with certified one-time signing keys Does not satisfy the non-framing requirement! Cashier picks (one-time) pub/private key pair One-time member certificate Bank admin Authenticates and sends Certifies with aggregate signature SmSm SmSm Signs and aggregates Please sign my check ScSc + = SaSa Verifies with signing keys SaSa Pub key Private Key
11
Our solution: anonymous-signer aggregate signature scheme Signing key has two parts Long-term public key certified by CA Long-term public key certified by CA Random one-time secret Random one-time secret Combined to become the signing key Combined to become the signing key Supports Signature aggregation Signature aggregation Anonymous authorization Anonymous authorization Based on the aggregate signature scheme [Boneh Gentry Shacham Lynn 03] Standard assumptions for pairing-based cryptography
12
Overview: Anonymous-signer aggregate signature scheme Long-termpublic-key Public-key certificate Trusted third-party Certifies with aggregate signature CkCkCkCk One-time secret secret One-time member certificate Bank admin Certifies with aggregate signature SmSmSmSm Cannot frame others Combine SmSmSmSm Aggregates Please sign my check ScScScSc + = SaSaSaSa Verifies with signing key SaSaSaSa Signs with
13
Entities and Operations in Our Scheme Entities Role manager (cashier in this talk) Role manager (cashier in this talk) Role member (bank admin in this talk) Role member (bank admin in this talk) Setup: Each entity chooses long-term public/private key pair Join: A user becomes a role member Obtains membership certificates Obtains membership certificates Sign: An entity signs on behalf of the role Operation Sign produces a role signature Operation Sign produces a role signature Aggregate: Multiple role signatures are aggregated Verify: Aggregate role signatures are verified Open: A role manager revokes the anonymity of a signer by revealing his or her identity
14
Some math about the operations Private key s u Public key P u = s u One-time signing secret x u One-time signing public key s u x u One-time signing public key s u x u Public parameter Public parameter SmSm s a H( ) Private key s a Public key P a = s a Certifies Obtains SaSa Verifies ScSc Signature s u x u H(m) + = SaSa ScSc SmSm Aggregates SaSa Role signature; may be aggregated further with others Framing is hard – equivalent to computational Diffie-Hellman Problem
15
Security Our anonymous-signer aggregate signature scheme satisfies the following requirements: Our anonymous-signer aggregate signature scheme satisfies the following requirements:correctness,unforgeability,anonymity,unlinkability,traceability,non-framing,coalition-resistance, and aggregation assuming assuming random oracle model, bilinear map, and gap groups.
16
An application: Anonymous role-based delegation The access to the digital library at a hospital is controlled Bob is a university professor and can access Bob can access Researchers at a company collaborate with Bob Need to access Collaborate Engineers at a lab collaborate with researchers Need to access Collaborate Hospital’s policy University prof. can access
17
Another application: Protecting whistleblower Protects the identity of whistleblowers The verifier only knows that the whistleblower is a certified FBI agent or a New York Times reporter The verifier only knows that the whistleblower is a certified FBI agent or a New York Times reporter Supports efficiently certification of a series of reports Signed reports of whistleblower(s) Enron scandal: day 101 Enron scandal: day 102 Enron scandal: day 103 Aggregated signature … S2S2S2S2 S1S1S1S1 S3S3S3S3 SASASASA
19
Non-framing property Our scheme protects a cashier from being framed by anyone including bank admin Consider a simple attack by an admin Picks random x* and s* and uses x*s* to sign Picks random x* and s* and uses x*s* to sign Admin cannot misattribute a signature to a cashier u u with pub key P u = s u u with pub key P u = s u e(s*x* , ) ≠ e(P u, x* ) e(s*x* , ) ≠ e(P u, x* ) In general, framing is equivalent to Computing b , given q, a , and c such that Computing b , given q, a , and c such that ab = c mod q known equivalence to CDH problem [Chen Zhang Kim 03]
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.