Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
- 45 Downloads
A delegateable signature scheme (DSS) which was first introduced by Barak is mainly based on the non-interactive zero-knowledge proof (NIZK) for preventing the signing verifier from telling which witness (i.e., restricted subset) is being used. However, the scheme is not significantly efficient due to the difficulty of constructing NIZK. We first show that a non-interactive witness indistinguishable (NIWI) proof system and a non-interactive witness hiding (NIWH) proof system are easier and more efficient proof models than NIZK in some cases. Furthermore, the witnesses employed in these two protocols (NIWI and NIWT) cannot also be distinguished by the verifiers. Combined with the Σ-protocol, we then construct NIWI and NIWH proofs for any NP statement under the existence of one-way functions and show that each proof is different from those under the existence of trapdoor permutations. Finally, based on our NIWI and NIWH proofs, we construct delegateable signature schemes under the existence of one-way functions, which are more efficient than Barak’s scheme under the existence of trapdoor permutations.
Keywordsdelegateable signature non-interactive zero-knowledge non-interactive witness indistinguishable non-interactive witness hiding Σ-protocol
Unable to display preview. Download preview PDF.
- 1.Barak B. Delegateable Signatures, 2001. http://www.math.ias.edu/boaz/Papers/delgsigs.ps
- 2.Mambo M, Usuda K, Okamoto E. Proxy Signatures. In: Proceedings of the 1995 Symposium on Cryptography and Information Security (SCIS 95). 1995, B1.1.1–17Google Scholar
- 3.Feige U, Shamir A. Witness Indistinguishable and Witness Hiding Protocols. In: 22nd ACM Symposium on the Theory of Computing. 1990. 416–426Google Scholar
- 5.Damgard I. On Σ-protocols. Available at http://www.daimi.au.dk/ivan/sigma.ps
- 7.Goldreich O, Sahai A, Vadhan S. Honest Verifier Statistical Zero-Knowledge Equals General Statistical Zero-Knowledge. In: Proc. 30th STOC. 1998, 399–408Google Scholar
- 8.Vadhan S. An unconditional study of computational zero-knowledge. In: FOCS 04. 2004, 176–185Google Scholar
- 9.Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. Boca Raton, Florida: CRC Press, 1996Google Scholar