Abstract
A cryptographic accumulator is a cryptographic primitive which produces a succinct aggregate of a set of elements. This type of scheme allows to produce a membership proof for each element of the set. In this paper, we propose a code-based cryptographic accumulator that is quantum computer resistant. Specifically, our scheme is based on the hardness of the Syndrome Decoding problem and satisfies the collision freeness and indistinguishability requirements. We also use double circulant codes which allow us to get a small key size, especially we get for an 80 bits security a small public key of 347 bits. Furthermore, we use the proposed cryptographic accumulator to create a fully dynamic code-based group signature. Moreover, we give an implementation of our scheme which is, to the best of our knowledge, the first direct implementation of a post-quantum cryptographic accumulator.
Similar content being viewed by others
References
Alamélou Q., Blazy O., Cauchie S., Gaborit P.: A code-based group signature scheme. Des. Codes Cryptogr. 82(1–2), 469–493 (2017).
Assidi H., Ayebie E.B., Souidi E.M.: A code-based group signature scheme with shorter public key length. In: SECRYPT-Lisbon, pp. 432–439. SciTePress (2016)
Assidi H., Ayebie E.B., Souidi E.M.: Two mutual authentication protocols based on zero-knowledge proofs for RFID systems. In: ICISC, Seoul, South Korea, volume 10779 of Lecture Notes in Computer Science, pp. 267–283. Springer (2017)
Augot D., Finiasz M., Sendrier N.: A family of fast syndrome based cryptographic hash functions. In: Mycrypt, Kuala Lumpur, volume 3715 of Lecture Notes in Computer Science, pp. 64–83. Springer (2005)
Augot D., Finiasz M., Sendrier N.: A fast provably secure cryptographic hash function. In: IACR Cryptology ePrint Archive (2003)
Ayebie B.E., Assidi H., Souidi E.M.: A new dynamic code-based group signature scheme. In: C2SI, Rabat, Morocco, volume 10194 of Lecture Notes in Computer Science, pp. 346–364. Springer (2017)
Benaloh J., Mare M.de: One-way accumulators: a decentralized alternative to digital signatures. In: Helleseth, T. (ed.) Advances in Cryptology-EUROCRYPT ’93, volume 765 of Lecture Notes in Computer Science, pp. 274–285. Springer (1994)
Bootle J., Cerulli A., Chaidos P., Ghadafi E., Groth J.: Foundations of fully dynamic group signatures. In: 14th International Conference, ACNS 2016, Guildford June 19–22, 2016., volume 9696 of Lecture Notes in Computer Science, pp. 117–136. Springer (2016)
Camacho P., Hevia A., Kiwi M., Opazo R.: Strong accumulators from collision-resistant hashing. Int. J. Inform Secur. 11(5), 349–363 (2012).
Camenisch J., Kohlweiss M., Soriente C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: PKC, volume 5443 of Lecture Notes in Computer Science, pp. 481–500. Springer (2009)
Camenisch J., Lysyanskaya A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: CRYPTO, Santa Barbara, California, USA, volume 2442 of Lecture Notes in Computer Science, pp. 61–76. Springer (2002)
Catalano D., Fiore D.: Vector commitments and their applications. In: PKC, Nara, Japan, volume 7778 of Lecture Notes in Computer Science, pp. 55–72. Springer (2013)
Derler D., Hanser C., Slamanig D.: Revisiting cryptographic accumulators, additional properties and relations to other primitives. In: Nyberg K. (ed.) CT-RSA 2015, San Francisco, CA, USA, April 20–24, volume 9048 of Lecture Notes in Computer Science, pp. 127–144. Springer (2015)
Derler D., Ramacher S., Slamanig D.: Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives. In: PQCrypto, Fort Lauderdale, FL, USA, volume 10786 of Lecture Notes in Computer Science, pp. 419–440. Springer (2018)
Finiasz M., Gaborit P., Sendrier N., Manuel S.: SHA-3 proposal: FSB. In: Proposal of a hash function for the NIST SHA-3 competition (2008) https://hal.inria.fr/inria-00564012
Goldreich O., Levin L.A.: A hard-core predicate for all one-way functions. In: 21st Annual ACM Symposium on Theory of Computing, Seattle, Washigton, USA, pp. 25–32. ACM (1989)
Jakobsson M., Leighton F.T., Micali S., Szydlo M.: Fractal Merkle Tree representation and traversal. In: CT-RSA, San Francisco, CA, USA, April 13–17, volume 2612 of Lecture Notes in Computer Science (2003)
Jhanwar M.P., Safavi-Naini R.: Compact accumulator using lattices. In: SPACE, Jaipur, India, volume 9354 of Lecture Notes in Computer Science, pp. 347–358. Springer (2015)
Kumar A., Lafourcade P., Lauradoux C.: Performances of cryptographic accumulators. In: IEEE, Local Computer Networks LCN, Edmonton, AB, Canada, pp. 366–369. IEEE Computer Society (2014)
Li J., Li N., Xue R.: Universal accumulators with efficient nonmembership proofs. In: ACNS, Zhuhai, China, volume 4521 of Lecture Notes in Computer Science, pp. 253–269. Springer (2007)
Libert B., Ling S., Nguyen K., Wang H.: Zero-knowledge arguments for lattice-based accumulators: Logarithmic-size ring signatures and group signatures without trapdoors. In: EUROCRYPT, Vienna, Austria, volume 9666 of Lecture Notes in Computer Science, pp. 1–31. Springer (2016)
Ling S., Nguyen K., Wang H., Xu Y.: Lattice-based group signatures: Achieving full dynamicity with ease. In: ACNS, Kanazawa, Japan, volume 10355 of Lecture Notes in Computer Science, pp. 293–312. Springer (2017)
Ling S., Nguyen K., Wang H., Xu Y.: Lattice-based group signatures: achieving full dynamicity (and deniability) with ease. Theor. Comput. Sci. 783, 71–94 (2019).
Nguyen K., Tang H., Wang H., Zeng N.: New code-based privacy-preserving cryptographic constructions. In: Galbraith SD., Moriai S. (eds.) Advances in Cryptology-ASIACRYPT-Kobe, Japan, December 8–12, volume 11922 of Lecture Notes in Computer Science, pp. 25–55. Springer (2019)
Pointcheval D., Stern J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000).
The FlexiProvider group at Technische Universität Darmstadt. In: FlexiProvider, an open source Java Cryptographic Service Provider. 2001–2018, http://www.flexiprovider.de/ Accessed 01 May 2019
Yu Z., Au M.H., Yang R., Lai J., Xu Q.: Lattice-based universal accumulator with nonmembership arguments. In: ACISP, Wollongong, NSW, Australia, volume 10946 of Lecture Notes in Computer Science, pp 502–519. Springer (2018)
Acknowledgements
Authors would like to express their acknowledgement and deep gratitude to the reviewers for their insightful comments, constructive remarks and efforts towards improving this paper. Authors are also grateful to Dr. Maryem Ait El Hadj who did a wonderful job in re-reading and providing language help.
Author information
Authors and Affiliations
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This is one of several papers published in Designs, Codes and Cryptography comprising the “Special Issue: On Coding Theory and Combinatorics: In Memory of Vera Pless”
Rights and permissions
About this article
Cite this article
Ayebie, E.B., Souidi, E.M. New code-based cryptographic accumulator and fully dynamic group signature. Des. Codes Cryptogr. 90, 2861–2891 (2022). https://doi.org/10.1007/s10623-022-01007-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-022-01007-5
Keywords
- Cryptographic accumulator
- Code-based cryptography
- Merkle-Tree
- Double circulant codes
- Post-quantum cryptography
- Fully dynamic group signature