TY - JOUR
T1 - Generic security-amplifying methods of ordinary digital signatures
AU - Li, Jin
AU - Zhang, Fangguo
AU - Chen, Xiaofeng
AU - Kim, Kwangjo
AU - Wong, Duncan S.
PY - 2012/10/15
Y1 - 2012/10/15
N2 - Digital signatures are one of the most fundamental primitives in cryptography. In this paper, three new paradigms are proposed to obtain signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), from any weakly-secure signature. These transformations are generic, simple, and provably secure in the standard model. In the first paradigm, based on a weakly-secure signature scheme, the construction of a fully-secure signature scheme requires one-time signature additionally. However, the other two are built only on weakly-secure signatures. To the best of our knowledge, it is observed for the first time in this paper that two weakly-secure signature schemes are sufficient to construct a fully-secure signature scheme. Based on the new proposed paradigms, several efficient instantiations without random oracles are also presented. We also show that these fully-secure signature schemes have many special interesting properties in application.
AB - Digital signatures are one of the most fundamental primitives in cryptography. In this paper, three new paradigms are proposed to obtain signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), from any weakly-secure signature. These transformations are generic, simple, and provably secure in the standard model. In the first paradigm, based on a weakly-secure signature scheme, the construction of a fully-secure signature scheme requires one-time signature additionally. However, the other two are built only on weakly-secure signatures. To the best of our knowledge, it is observed for the first time in this paper that two weakly-secure signature schemes are sufficient to construct a fully-secure signature scheme. Based on the new proposed paradigms, several efficient instantiations without random oracles are also presented. We also show that these fully-secure signature schemes have many special interesting properties in application.
KW - One-time signature
KW - q-SDH assumption
KW - Signature
KW - Strong unforgeability
KW - Strong-RSA assumption
KW - Weak chosen message attack
UR - http://www.scopus.com/inward/record.url?scp=84860297453&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-84860297453&origin=recordpage
U2 - 10.1016/j.ins.2012.03.006
DO - 10.1016/j.ins.2012.03.006
M3 - RGC 21 - Publication in refereed journal
SN - 0020-0255
VL - 201
SP - 128
EP - 139
JO - Information Sciences
JF - Information Sciences
ER -