Lattice Blind Signatures with Forward Security

07/14/2020
by   Huy Quoc Le, et al.
0

Blind signatures play an important role in both electronic cash and electronic voting systems. Blind signatures should be secure against various attacks (such as signature forgeries). The work puts a special attention to secret key exposure attacks, which totally break digital signatures. Signatures that resist secret key exposure attacks are called forward secure in the sense that disclosure of a current secret key does not compromise past secret keys. This means that forward-secure signatures must include a mechanism for secret-key evolution over time periods. This paper gives a construction of the first blind signature that is forward secure. The construction is based on the SIS assumption in the lattice setting. The core techniques applied are the binary tree data structure for the time periods and the trapdoor delegation for the key-evolution mechanism.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/25/2018

Forward-Secure Group Signatures from Lattices

Group signature is a fundamental cryptographic primitive, aiming to prot...
research
05/14/2022

FROG: Forward-Secure Post-Quantum Signature

Forward-secure signatures guarantee that the signatures generated before...
research
05/16/2023

Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System

This paper discusses several recent electronic-paper remote voting hybri...
research
11/01/2018

Spectral Signatures in Backdoor Attacks

A recent line of work has uncovered a new form of data poisoning: so-cal...
research
09/09/2019

Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol

Proof-of-stake (PoS) blockchain protocols are emerging as one of the mos...
research
09/29/2018

Statistical Inference Attack Against PHY-layer Key Extraction and Countermeasures

The formal theoretical analysis on channel correlations in both real ind...
research
02/21/2022

Using analog scrambling circuits for automotive sensor integrity and authenticity

The automotive domain rapidly increases the embedded amount of complex a...

Please sign up or login with your details

Forgot password? Click here to reset