Science in China Series F: Information Sciences

, Volume 51, Issue 2, pp 128–144

Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs

  • Tang ChunMing 
  • Pei DingYi 
  • Wang XiaoFeng 
  • Liu ZhuoJun 
Article

DOI: 10.1007/s11432-008-0003-7

Cite this article as:
Tang, C., Pei, D., Wang, X. et al. Sci. China Ser. F-Inf. Sci. (2008) 51: 128. doi:10.1007/s11432-008-0003-7

Abstract

A delegateable signature scheme (DSS) which was first introduced by Barak is mainly based on the non-interactive zero-knowledge proof (NIZK) for preventing the signing verifier from telling which witness (i.e., restricted subset) is being used. However, the scheme is not significantly efficient due to the difficulty of constructing NIZK. We first show that a non-interactive witness indistinguishable (NIWI) proof system and a non-interactive witness hiding (NIWH) proof system are easier and more efficient proof models than NIZK in some cases. Furthermore, the witnesses employed in these two protocols (NIWI and NIWT) cannot also be distinguished by the verifiers. Combined with the Σ-protocol, we then construct NIWI and NIWH proofs for any NP statement under the existence of one-way functions and show that each proof is different from those under the existence of trapdoor permutations. Finally, based on our NIWI and NIWH proofs, we construct delegateable signature schemes under the existence of one-way functions, which are more efficient than Barak’s scheme under the existence of trapdoor permutations.

Keywords

delegateable signaturenon-interactive zero-knowledgenon-interactive witness indistinguishablenon-interactive witness hidingΣ-protocol

Copyright information

© Science in China Press 2008

Authors and Affiliations

  • Tang ChunMing 
    • 1
  • Pei DingYi 
    • 1
    • 2
  • Wang XiaoFeng 
    • 3
  • Liu ZhuoJun 
    • 4
  1. 1.Province Key LaboratoryInstitute of Information Security of Guangzhou UniversityGuangzhouChina
  2. 2.State Key Laboratory of Information SecurityChinese Academy of SciencesBeijingChina
  3. 3.School of Mathematics and Computational Mathematics of Shenzhen UniversityShenzhenChina
  4. 4.Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijingChina