2014
DOI: 10.1007/978-3-662-44371-2_22
|View full text |Cite
|
Sign up to set email alerts
|

Structure-Preserving Signatures from Type II Pairings

Abstract: Abstract. We investigate structure-preserving signatures in asymmetric bilinear groups with an efficiently computable homomorphism from one source group to the other, i.e., the Type II setting. It has been shown that in the Type I and Type III settings (with maximal symmetry and maximal asymmetry respectively), structure-preserving signatures need at least 2 verification equations and 3 group elements. It is therefore natural to conjecture that this would also be required in the intermediate Type II setting, b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(40 citation statements)
references
References 31 publications
0
40
0
Order By: Relevance
“…At the same time, an isomorphic copy of H can be publicly computed in the target group Gt , i.e., anyone can compute e(H(X), g). 1 Second, when generated in trapdoor mode, for two given group elements g, h e G such that h = gz, the trapdoor allows one to write every H(X) as gcx (z) for a degree-d polynomial cx (z).…”
Section: O U R Contrib U Tio Nmentioning
confidence: 99%
“…At the same time, an isomorphic copy of H can be publicly computed in the target group Gt , i.e., anyone can compute e(H(X), g). 1 Second, when generated in trapdoor mode, for two given group elements g, h e G such that h = gz, the trapdoor allows one to write every H(X) as gcx (z) for a degree-d polynomial cx (z).…”
Section: O U R Contrib U Tio Nmentioning
confidence: 99%
“…Second, and more importantly, there are attacks on the scheme if the membership tests are omitted. For example, given a valid signed message (M, (R, S)), one can easily 5 select a second point 5 Given R ∈ G2, one computes R1 = ψ(R) and selects arbitrary R 2 ∈ G3 with R 2 = R · R −1…”
Section: Comparisonsmentioning
confidence: 99%
“…Ghadafi [25] gave a structure-preserving variant of the Camenisch-Lysyanskaya signature scheme [15] that is secure under an interactive assumption in the Type-III setting. Abe et al [7] constructed a scheme in the Type-II setting (where there is an efficiently computable isomorphism from the second source group to the first) which contains only 2 group elements. Chatterjee and Menezes [17] revisited the work of [7] and showed that Type-III constructions outperform their Type-II counterparts.…”
Section: Introductionmentioning
confidence: 99%
“…Abe et al [7] constructed a scheme in the Type-II setting (where there is an efficiently computable isomorphism from the second source group to the first) which contains only 2 group elements. Chatterjee and Menezes [17] revisited the work of [7] and showed that Type-III constructions outperform their Type-II counterparts. [17] also gave constructions in Type-III setting meeting the 3 group element lower bound.…”
Section: Introductionmentioning
confidence: 99%