PROPOSED THRESHOLD BLIND SIGNATURE SCHEME SUPPORTING FORWARD SECURITY OF USER KEYS

Hải Lê đình1,2, , Trịnh Viết Cường2, Huy Le Quoc3
1 Ncs đại học hồng đức
2 Hong Duc University
3 Đại Học Tân Tạo

Main Article Content

Abstract

In this paper, we propose a new type of signature scheme called the Forward-Secure Threshold Blind Signature (abbreviated as FSTBS), which integrates forward security into a threshold blind signature scheme to enhance protection against secret key exposure attacks. The forward-security property ensures that even if the secret key at the current epoch is compromised, all signatures generated in previous epochs remain intact and cannot be forged retroactively. We achieve this forward-security property through a key-update mechanism across epochs (time periods), in which all participating signers can securely and synchronously update their secret keys. To illustrate the proposed scheme, we construct a concrete FSTBS instance based on the Snowblind threshold blind signature (by Elizabeth Crites et al., presented at CRYPTO 2023). The proposed FSTBS retains Snowblind’s advantages in signing efficiency, signature size, and its underlying security properties, while additionally incorporating forward security. However, this integration introduces some additional computational cost compared to Snowblind, particularly in the key generation and key update phases.

Article Details

References

[1]. Chaum, D. (1983). Blind Signatures for Untraceable Payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds) Advances in Cryptology. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-0602-4_18
[2]. Galil, Z., Haber, S., Yung, M. (1988). Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model (Extended Abstract). In: Pomerance, C. (eds) Advances in Cryptology — CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48184-2_10
[3]. Bellare, M., Miner, S.K. (1999). A Forward-Secure Digital Signature Scheme. In: Wiener, M. (eds) Advances in Cryptology — CRYPTO’ 99. CRYPTO 1999. Lecture Notes in Computer Science, vol 1666. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48405-1_28
[4]. S. Micali, M. Rabin and S. Vadhan, "Verifiable random functions," 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039), New York, NY, USA, 1999, pp. 120-130, doi: 10.1109/SFFCS.1999.814584.
[5]. Crites, E., Komlo, C., Maller, M., Tessaro, S., & Zhu, C. (2023). Snowblind: A threshold blind signature in pairing-free groups. In T. Malkin & C. Peikert (Eds.), Advances in cryptology – CRYPTO 2023 (pp. 669–699). Springer. https://doi.org/10.1007/978-3-031-38557-5_23
[6]. D. Chaum. Blind signatures for untraceable payments. In Crypto ’83, Lec-ture Notes in Computer Science, page 153, 1984
[7]. Kurek, R. (2020). Efficient Forward-Secure Threshold Signatures. In: Aoki, K., Kanaoka, A. (eds) Advances in Information and Computer Security. IWSEC 2020. Lecture Notes in Computer Science(), vol 12231. Springer, Cham. https://doi.org/10.1007/978-3-030-58208-1_14
[8]. Shamir, A. (1979) How to Share a Secret. Communications of the ACM, 22, 612-613.
http://dx.doi.org/10.1145/359168.359176
[9]. S. Tessaro and C. Zhu. “Short Pairing-Free Blind Signatures with Exponential Security”. In: EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022II. Ed. by O. Dunkelman and S. Dziembowski
[10]. Paul Feldman. A practical scheme for non-interactive verifiable secret sharing. In 28th Annual Symposium on Foundations of Computer Science, Los Angeles, California, USA, 27-29 October 1987, pages 427–437. IEEE Computer Society,1987. doi:10.1109/SFCS.1987.4.