Abstract

In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts. In other words, these schemes suppose that (the implementation of) the group signature generation algorithm is running in a platform that is perfectly protected from various intrusions and attacks. As a complementary to existing studies, how to generate group signatures securely in a more austere security context, such as a white-box attack context, is studied in this paper. We use obfuscation as an approach to acquire a higher level of security. Concretely, we introduce a special group signature functionality-an encrypted group signature, and then provide an obfuscator for the proposed functionality. A series of new security notions for both the functionality and its obfuscator has been introduced. The most important one is the average-case secure virtual black-box property w.r.t. dependent oracles and restricted dependent oracles which captures the requirement of protecting the output of the proposed obfuscator against collision attacks from group members. The security notions fit for many other specialized obfuscators, such as obfuscators for identity-based signatures, threshold signatures and key-insulated signatures. Finally, the correctness and security of the proposed obfuscator have been proven. Thereby, the obfuscated encrypted group signature functionality can be applied to variants of privacy-preserving security schemes and enhance the security level of these schemes.

Highlights

  • Group signature was proposed by Cham and Heyst [1], which is a special type of digital signature for a group of persons

  • We use C = {Cλ}λ 2 N to denote a class of such circuits, where there exists an associated Probabilistic Polynomial Time (PPT) generation algorithm which takes as input 1λ and generates a random circuit C 2 $ Cλ

  • We propose an obfuscator ObfEGS for the Cpub;sk;PKe that implements the encrypted group signature (EGS) functionality as follows

Read more

Summary

Introduction

Group signature was proposed by Cham and Heyst [1], which is a special type of digital signature for a group of persons. Given a signature S, based on the master secret key, the group manager can extract the identity of the group member who created S The most important one of the new security notions is average-case secure virtual black-box property (ACVBP) w.r.t. Dependent Oracles and Restricted Dependent Oracles, which describes the security requirement of protecting the output of the proposed obfuscator, i.e., the obfuscated implementation of encrypted group signature functionality against collision attacks from group members. In the case that an investigation is needed, the group manager is capable of opening the identity of the user For another example, in a privacy-preserving emergency call (PEC) scheme for mobile healthcare social networks, the obfuscatable encrypted group signature scheme and its obfuscator can be used to implement a decentralized emergency response system for a rapid response of emergency care in the network.

Obfuscation and Its Recent Advances
Probabilistic Circuits and Circuit Obfuscators
Complexity Assumptions
The Overall Scheme
The Encrypted Group Signature Functionality
Efficiency Analysis
Design of the Obfuscator
Preserving Functionality
Security Properties
Possible Applications and Extensions
The Rationale Behind the Obfuscatable Sign-Then-Encrypt Functionalities
The Contribution
Conclusions and Future Work

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.