step out ring signatures
play

Step-out Ring Signatures Marek Klonowski, ukasz Krzywiecki, Mirosaw - PowerPoint PPT Presentation

Introduction Construction Step-out Ring Signatures Marek Klonowski, ukasz Krzywiecki, Mirosaw Kutyowski and Anna Lauks Institute of Mathematics and Computer Science Wrocaw University of Technology MFCS 2008 25-29 August 2008, Toru


  1. Introduction Construction Step-out Ring Signatures Marek Klonowski, Łukasz Krzywiecki, Mirosław Kutyłowski and Anna Lauks Institute of Mathematics and Computer Science Wrocław University of Technology MFCS 2008 25-29 August 2008, Toru´ n, Poland Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  2. Introduction Construction Introduction 1 Digital signatures Step-out Signatures Construction 2 Preliminaries Signature Creation Confession Procedure Step-out Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  3. Introduction Digital signatures Construction Step-out Signatures Digital Signatures Procedures : key setup: private key - for creating a signature public key - for verifying a signature creating a signature signature verification Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  4. Introduction Digital signatures Construction Step-out Signatures Digital Signatures Procedures : key setup: private key - for creating a signature public key - for verifying a signature creating a signature signature verification Signing M : Alice takes her private key k Alice and computes s := sign ( M , k Alice ) Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  5. Introduction Digital signatures Construction Step-out Signatures Digital Signatures Procedures : key setup: private key - for creating a signature public key - for verifying a signature creating a signature signature verification Signing M : Alice takes her private key k Alice and computes s := sign ( M , k Alice ) Verifying signature s of M : Bob takes the public key p Alice and checks if test ( s , M , p Alice ) = true Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  6. Introduction Digital signatures Construction Step-out Signatures Digital Signatures Properties: verification outcome is positive, if k Alice used for signature 1 creation and p Alice for verification, Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  7. Introduction Digital signatures Construction Step-out Signatures Digital Signatures Properties: verification outcome is positive, if k Alice used for signature 1 creation and p Alice for verification, test ( s , M , p Alice ) = false , if M has been changed after 2 creating signature s , Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  8. Introduction Digital signatures Construction Step-out Signatures Digital Signatures Properties: verification outcome is positive, if k Alice used for signature 1 creation and p Alice for verification, test ( s , M , p Alice ) = false , if M has been changed after 2 creating signature s , without the private key k Alice , it is infeasible to produce a 3 signature of Alice that is verified positively. Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  9. Introduction Digital signatures Construction Step-out Signatures Digital Signatures Properties: verification outcome is positive, if k Alice used for signature 1 creation and p Alice for verification, test ( s , M , p Alice ) = false , if M has been changed after 2 creating signature s , without the private key k Alice , it is infeasible to produce a 3 signature of Alice that is verified positively. So if test ( s , M , p Alice ) = true , then only the holder of k Alice (i.e. Alice) could produce s for message M . Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  10. Introduction Digital signatures Construction Step-out Signatures Ring Signatures Properties: the signer is within the group of potential signers called a 1 ring, Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  11. Introduction Digital signatures Construction Step-out Signatures Ring Signatures Properties: the signer is within the group of potential signers called a 1 ring, the signer uses his own private key and the public keys of 2 the other ring members to create a signature, Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  12. Introduction Digital signatures Construction Step-out Signatures Ring Signatures Properties: the signer is within the group of potential signers called a 1 ring, the signer uses his own private key and the public keys of 2 the other ring members to create a signature, for verification the public keys of the ring members are 3 used, Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  13. Introduction Digital signatures Construction Step-out Signatures Ring Signatures Properties: the signer is within the group of potential signers called a 1 ring, the signer uses his own private key and the public keys of 2 the other ring members to create a signature, for verification the public keys of the ring members are 3 used, it is infeasible to detect which ring member created a 4 signature. Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  14. Introduction Digital signatures Construction Step-out Signatures Ring Signatures Properties: the signer is within the group of potential signers called a 1 ring, the signer uses his own private key and the public keys of 2 the other ring members to create a signature, for verification the public keys of the ring members are 3 used, it is infeasible to detect which ring member created a 4 signature. the signer is perfectly hidden in the ring. 5 one cannot prevent being a member of a ring. 6 Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  15. Introduction Digital signatures Construction Step-out Signatures Malicious Application of Ring Signatures Leaking information A member of a group (i.e. a parliament commission) can leak a secret information to the press. The message is authenticated with a ring signature - with the commission members as the ring. Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  16. Introduction Digital signatures Construction Step-out Signatures Malicious Application of Ring Signatures Leaking information A member of a group (i.e. a parliament commission) can leak a secret information to the press. The message is authenticated with a ring signature - with the commission members as the ring. Properties one can easily check that some commission member has 1 signed it, and so the information is authentic, no investigation can reveal the information source. 2 Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  17. Introduction Digital signatures Construction Step-out Signatures Malicious Application of Ring Signatures Leaking information A member of a group (i.e. a parliament commission) can leak a secret information to the press. The message is authenticated with a ring signature - with the commission members as the ring. Properties one can easily check that some commission member has 1 signed it, and so the information is authentic, no investigation can reveal the information source. 2 As soon as public keys (e.g. RSA keys) of the commission members are published, nothing can prevent this scenario! Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  18. Introduction Digital signatures Construction Step-out Signatures Step-out Signatures – Target Applications Electronic auction Requirements: strong authentication and anonymity of the bids (also 1 against the auction manager), possibility of immediate withdrawal of the deposit 2 immediately after leaving the auction. Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  19. Introduction Digital signatures Construction Step-out Signatures Step-out Signatures – Target Applications Electronic auction Requirements: strong authentication and anonymity of the bids (also 1 against the auction manager), possibility of immediate withdrawal of the deposit 2 immediately after leaving the auction. Ring signatures? a ring signature authentication and anonymity, 1 however, there is no way to force the winner to reveal 2 himself! a useless solution ... Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  20. Introduction Digital signatures Construction Step-out Signatures Step-out Signatures Properties Anonymity: ring type signature: identity of the signer(s) is hidden among identities of non-signers in a ring. Confession procedure: the real signer can prove that he has participated in signature creation. Step-out procedure: a non-signer can prove that he has not participated in signature creation. Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  21. Introduction Digital signatures Construction Step-out Signatures Step-out Signatures Properties for auction protocol Strong anonymity: necessary for fairness of e-auctions. Confession procedure: the real signer of the winning bid can reveal himself against the auction. Step-out procedure: a non-signer of the highest bid can step out during the auction and withdraw the deposit. Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

  22. Preliminaries Introduction Signature Creation Construction Confession Procedure Step-out Discrete Logarithm DL hardness we use a cyclic group G such that computing g x is easy for each g , x given a random y , it is infeasible to find x such that y = g x . Secret keys Each user U has its private key x U selected at random the corresponding public key is y U = g x U , where g is a fixed generator of G . Klonowski, Krzywiecki, Kutyłowski, Lauks Step-out Ring Signatures

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend