Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Tightly secure signatures from lossy identification schemes
Abdalla M., Fouque P., Lyubashevsky V., Tibouchi M. Journal of Cryptology29 (3):597-631,2016.Type:Article
Date Reviewed: Sep 7 2016

The authors have done a great job in presenting a potentially high-impact work. The paper studies signature schemes that are secure in the random oracle model, particularly those based on the Fiat-Shamir (heuristic) technique.

It first presents “three digital signature schemes with tight security reductions”; the schemes are typically more efficient due to the tight reduction. The first two are respectively based on Girault et al.’s short exponent discrete log-based scheme [1] and Lyubashevsky’s scheme [2] relying “on the worst-case hardness of the shortest vector problem in ideal lattices.” The third one, proposed by the authors, is “based on the hardness of the subset sum problem.” The authors also define a lossy identification scheme and give a general transformation framework that converts a lossy identification scheme into a signature scheme with tight security reduction.

The paper is filled with sufficient concrete protocols and formal proofs. The authors did a great job of presenting and formalizing different schemes in a common framework.

This work will have a great impact on (efficient) signature schemes, particularly in simplifying the construction and proof of the security of signature schemes. It is a worthwhile read.

Reviewer:  Xukai Zou Review #: CR144738 (1612-0897)
1) Girault, M.; Poupard, G.; Stern, J. On the fly authentication and signature schemes based on groups of unknown order. Journal of Cryptology 19, 4(2006), 463–487.
2) Lyubashevsky, V. Fiat-Shamir with aborts: applications to lattice and factoring-based signatures. In Advances in Cryptology--ASIACRYPT 2009 (LNCS 5912). Springer, Berlin, 2009, 598–616.
Bookmark and Share
 
Public Key Cryptosystems (E.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Public Key Cryptosystems": Date
Direct demonstration of the power to break public-key cryptosystems
Koyama K.  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)211990. Type: Proceedings
Sep 1 1991
Public-key cryptography
Salomaa A., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9783540528319)
Feb 1 1992
Computation of discrete logarithms in prime fields
LaMacchia B., Odlyzko A. Designs, Codes and Cryptography 1(1): 47-62, 1991. Type: Article
Apr 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy