Skip to main content
Log in

New code-based cryptographic accumulator and fully dynamic group signature

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

A cryptographic accumulator is a cryptographic primitive which produces a succinct aggregate of a set of elements. This type of scheme allows to produce a membership proof for each element of the set. In this paper, we propose a code-based cryptographic accumulator that is quantum computer resistant. Specifically, our scheme is based on the hardness of the Syndrome Decoding problem and satisfies the collision freeness and indistinguishability requirements. We also use double circulant codes which allow us to get a small key size, especially we get for an 80 bits security a small public key of 347 bits. Furthermore, we use the proposed cryptographic accumulator to create a fully dynamic code-based group signature. Moreover, we give an implementation of our scheme which is, to the best of our knowledge, the first direct implementation of a post-quantum cryptographic accumulator.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Alamélou Q., Blazy O., Cauchie S., Gaborit P.: A code-based group signature scheme. Des. Codes Cryptogr. 82(1–2), 469–493 (2017).

    Article  MathSciNet  MATH  Google Scholar 

  2. Assidi H., Ayebie E.B., Souidi E.M.: A code-based group signature scheme with shorter public key length. In: SECRYPT-Lisbon, pp. 432–439. SciTePress (2016)

  3. Assidi H., Ayebie E.B., Souidi E.M.: Two mutual authentication protocols based on zero-knowledge proofs for RFID systems. In: ICISC, Seoul, South Korea, volume 10779 of Lecture Notes in Computer Science, pp. 267–283. Springer (2017)

  4. Augot D., Finiasz M., Sendrier N.: A family of fast syndrome based cryptographic hash functions. In: Mycrypt, Kuala Lumpur, volume 3715 of Lecture Notes in Computer Science, pp. 64–83. Springer (2005)

  5. Augot D., Finiasz M., Sendrier N.: A fast provably secure cryptographic hash function. In: IACR Cryptology ePrint Archive (2003)

  6. Ayebie B.E., Assidi H., Souidi E.M.: A new dynamic code-based group signature scheme. In: C2SI, Rabat, Morocco, volume 10194 of Lecture Notes in Computer Science, pp. 346–364. Springer (2017)

  7. Benaloh J., Mare M.de: One-way accumulators: a decentralized alternative to digital signatures. In: Helleseth, T. (ed.) Advances in Cryptology-EUROCRYPT ’93, volume 765 of Lecture Notes in Computer Science, pp. 274–285. Springer (1994)

  8. Bootle J., Cerulli A., Chaidos P., Ghadafi E., Groth J.: Foundations of fully dynamic group signatures. In: 14th International Conference, ACNS 2016, Guildford June 19–22, 2016., volume 9696 of Lecture Notes in Computer Science, pp. 117–136. Springer (2016)

  9. Camacho P., Hevia A., Kiwi M., Opazo R.: Strong accumulators from collision-resistant hashing. Int. J. Inform Secur. 11(5), 349–363 (2012).

    Article  Google Scholar 

  10. Camenisch J., Kohlweiss M., Soriente C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: PKC, volume 5443 of Lecture Notes in Computer Science, pp. 481–500. Springer (2009)

  11. Camenisch J., Lysyanskaya A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: CRYPTO, Santa Barbara, California, USA, volume 2442 of Lecture Notes in Computer Science, pp. 61–76. Springer (2002)

  12. Catalano D., Fiore D.: Vector commitments and their applications. In: PKC, Nara, Japan, volume 7778 of Lecture Notes in Computer Science, pp. 55–72. Springer (2013)

  13. Derler D., Hanser C., Slamanig D.: Revisiting cryptographic accumulators, additional properties and relations to other primitives. In: Nyberg K. (ed.) CT-RSA 2015, San Francisco, CA, USA, April 20–24, volume 9048 of Lecture Notes in Computer Science, pp. 127–144. Springer (2015)

  14. Derler D., Ramacher S., Slamanig D.: Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives. In: PQCrypto, Fort Lauderdale, FL, USA, volume 10786 of Lecture Notes in Computer Science, pp. 419–440. Springer (2018)

  15. Finiasz M., Gaborit P., Sendrier N., Manuel S.: SHA-3 proposal: FSB. In: Proposal of a hash function for the NIST SHA-3 competition (2008) https://hal.inria.fr/inria-00564012

  16. Goldreich O., Levin L.A.: A hard-core predicate for all one-way functions. In: 21st Annual ACM Symposium on Theory of Computing, Seattle, Washigton, USA, pp. 25–32. ACM (1989)

  17. Jakobsson M., Leighton F.T., Micali S., Szydlo M.: Fractal Merkle Tree representation and traversal. In: CT-RSA, San Francisco, CA, USA, April 13–17, volume 2612 of Lecture Notes in Computer Science (2003)

  18. Jhanwar M.P., Safavi-Naini R.: Compact accumulator using lattices. In: SPACE, Jaipur, India, volume 9354 of Lecture Notes in Computer Science, pp. 347–358. Springer (2015)

  19. Kumar A., Lafourcade P., Lauradoux C.: Performances of cryptographic accumulators. In: IEEE, Local Computer Networks LCN, Edmonton, AB, Canada, pp. 366–369. IEEE Computer Society (2014)

  20. Li J., Li N., Xue R.: Universal accumulators with efficient nonmembership proofs. In: ACNS, Zhuhai, China, volume 4521 of Lecture Notes in Computer Science, pp. 253–269. Springer (2007)

  21. Libert B., Ling S., Nguyen K., Wang H.: Zero-knowledge arguments for lattice-based accumulators: Logarithmic-size ring signatures and group signatures without trapdoors. In: EUROCRYPT, Vienna, Austria, volume 9666 of Lecture Notes in Computer Science, pp. 1–31. Springer (2016)

  22. Ling S., Nguyen K., Wang H., Xu Y.: Lattice-based group signatures: Achieving full dynamicity with ease. In: ACNS, Kanazawa, Japan, volume 10355 of Lecture Notes in Computer Science, pp. 293–312. Springer (2017)

  23. Ling S., Nguyen K., Wang H., Xu Y.: Lattice-based group signatures: achieving full dynamicity (and deniability) with ease. Theor. Comput. Sci. 783, 71–94 (2019).

    Article  MathSciNet  MATH  Google Scholar 

  24. Nguyen K., Tang H., Wang H., Zeng N.: New code-based privacy-preserving cryptographic constructions. In: Galbraith SD., Moriai S. (eds.) Advances in Cryptology-ASIACRYPT-Kobe, Japan, December 8–12, volume 11922 of Lecture Notes in Computer Science, pp. 25–55. Springer (2019)

  25. Pointcheval D., Stern J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000).

    Article  MATH  Google Scholar 

  26. The FlexiProvider group at Technische Universität Darmstadt. In: FlexiProvider, an open source Java Cryptographic Service Provider. 2001–2018, http://www.flexiprovider.de/ Accessed 01 May 2019

  27. Yu Z., Au M.H., Yang R., Lai J., Xu Q.: Lattice-based universal accumulator with nonmembership arguments. In: ACISP, Wollongong, NSW, Australia, volume 10946 of Lecture Notes in Computer Science, pp 502–519. Springer (2018)

Download references

Acknowledgements

Authors would like to express their acknowledgement and deep gratitude to the reviewers for their insightful comments, constructive remarks and efforts towards improving this paper. Authors are also grateful to Dr. Maryem Ait El Hadj who did a wonderful job in re-reading and providing language help.

Author information

Authors and Affiliations

Authors

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This is one of several papers published in Designs, Codes and Cryptography comprising the “Special Issue: On Coding Theory and Combinatorics: In Memory of Vera Pless”

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ayebie, E.B., Souidi, E.M. New code-based cryptographic accumulator and fully dynamic group signature. Des. Codes Cryptogr. 90, 2861–2891 (2022). https://doi.org/10.1007/s10623-022-01007-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-022-01007-5

Keywords

Mathematics Subject Classification

Navigation